# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
14cfe4a75d3163ea972662881f7ff4f53c66a0519695553f49f7b5bac44be96d
Pseudo Output
9a93c4b501655608187f7595a2a9f6e81b43095b1607f4ac8421b461a944ec4f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
560c9ab291f7599ed9b3dee699f765e793d911e2767b7da6f22d270fd8c10869
Commitment
5a44dad7db3645b465969c40829d753a77578372888afbbcd02d77be2d28a659
Range Proof
672 bytes (Bulletproof)
Memo
c256d690216a52bdfb14060a829f1329e0d1c1b27fe93efe408e5266ed88b0ddde40174815941fde1a53576e67ac284a4292aa79d05f76bed14d118ab19ce108ce247ef1ce0f220e68f9557c5d4bc43228ebced8f62d54c9ee3bd58ec5e3b8f0c4282dfe7207e6ba24b4aa351865522c94af202bd501a1c4b239239a882e4135 (encrypted)
Stealth Address
f4eb07cbb3f379f1589fe2f440f498b587ab549e8765d14a5757a3bb2e949324
Commitment
467deeb20eaff9167e6e060954e3dbb0196b4b7d2951c9805cb0a5b459137d4a
Range Proof
672 bytes (Bulletproof)
Memo
211a8dcda923cd8ccc962d1538826a84583982d83c4012f3ba67b1423c92efd447dfcaa808f2f99c808fa7cf792935c0c6fbbf12b609cd82ea4a35b9b09b6d60f636ebbeb0276d5bd328a4a32bae3aee526579c44ee2ae52bc18597a503d6b9057ccdebc97de54f8903956e16dbd656f1a9ec681fa52d196c363403d59b22c04 (encrypted)