# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b022656d0273db31f87647faf2d70f1a631ca9f488f8dff39ff076688d49202b
Pseudo Output
14ac4810de068a227489a6fb0d2fb1d4a9e40e10f6344b668ed5157d4e3f4111
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
40e6fde0be11711f63d48724a2d8155aa2c260651f56be73f805c8760e065a4e
Commitment
b44ae83da8246890f5c3c808ed6a82f1f3ac60d3014be54c8ae181033cc7875b
Range Proof
672 bytes (Bulletproof)
Memo
d006c74fcf3655f4ab35b85d1eb944810680f86f54cbad9bdd16695702903811097b1b4472b8e090eb47e42feaefd990b6236d070a3d7547c5babe639652f729f601845e2e2a11c6291bc9b8eaf09533dabb32ebc6f8dfa6917c41d303e2e6bebd4a608c5363e562d5248c7f106ab774edbb74624e58889ec8e14c93cfd6b0c6 (encrypted)
Stealth Address
4287656398d096d27c44139352d532833bd5be8fd028ebdb31c0463377e45a06
Commitment
e2bc5cd8c7f15c79c0710dbdc6c49697e28fb2b2661b3a2dcdee8669fd58142b
Range Proof
672 bytes (Bulletproof)
Memo
6de44ebf89b1bde592d99224602dbf4ab25fd4acee09875985feb05d358e3750a8ff578094b87b1d9bc8ce544445bc0719895e49a58dd4b2e0ac301d6365b7e7c779a5bb1d871352b35147b5e67f79e4ec7cd5ac74ce111c72044ca019e9f0acd2c790184197b02c9548b61e86273577280b1fd36ef152b2f4071f04dc0c9bdb (encrypted)