# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
206cb1a0b4efce1f259b298384aa43dd1361ebe1cccccae89193bf6134456c66
Pseudo Output
125f8b7dda9065954e714955f6fcf7ef2709e33050e34258bbcf226e0ce7c515
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
30a4f713321306d092b722f6954fa2041df3a98adc79b64e1556466c67e13a3a
Commitment
cc8ed93fa4308232bedb1c252d5ad0dea85b21d98ceffb843b6d45f29d77314e
Range Proof
672 bytes (Bulletproof)
Memo
95b88ab1e820318d52b2960deb10f4ad4684e8c4e2a0bf152adb8daf7911e5607d1473d9bb2c525c74dab9f608912d3725c6f8fb0178488fbc1563e28615147843a3585d119675bf355b25ceeb2036dd2b2c9284ea6a5c87a7905a55fe96b0435eb31b0b9f7a65a95c8e38e1508f850b385a64dc747c89e6c69e6b522ee07c43 (encrypted)
Stealth Address
be6cc0e6c336286b6e417987ca279cf77f9f7f40dd8ae04fef59d89dc6dd015e
Commitment
86da2ae2ba5abeb67b4097a23f3f11d70a9e9f50ef959a31cddc16bb7347063a
Range Proof
672 bytes (Bulletproof)
Memo
9ed1290ece81600cfb55d5099df4d04ad1576907884f692090c6ed8500795e0b51da7d4c3e25c22c29b8ded044c397d88b487a072e1c8745fecbcf88e2ed42f116751ccb8d5185b5f8f3553d0b697b26bcd9509e0fc891bdf83bccb498c83dae3684debed91c4e6c1c817d90ef4b9b478b71eb64dd64b895c57edb3d9b1351d4 (encrypted)