# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aaea9eff371c9731c23b2a378303c192f067e1954eeeb9a4d87bcc274b96721c
Pseudo Output
9ef975b3ff2fef4950ca8d38f2b83b4990d89554ce16c9a93f2689be5def5902
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d27d54d8226dab96f50c0f56f8b113cd6f25e22e749085a1e459028d44efad5c
Commitment
185aa09c9fd6a4ecf6f41cf80d91c5e4371a1c45a071f6ca112ac67585d2dd12
Range Proof
672 bytes (Bulletproof)
Memo
227c96c53cb55ab8331f568484c7b4fd4cf668c3a484e4e4abbd15a0b6d91353c92e48d4f7187388b933605ff37fbe84b9030c9a3c08e823a37ca866ad4b7bb9ee1c5a4e5f12ca5b535ffbc3e51607999cbd3244b1996b7f1d08ebf7975452f60773b30b5b87f113b80b5d560c250df42478e1c9f257f5cc65df1587d6bb546f (encrypted)
Stealth Address
c643824d91d600041e3686e4e75446953e2b30b71a3be12615610c0552d60a4c
Commitment
a286cef78e050c7dc57c068cec8c331a19ce0aa5b71be7706df8c06d2dca4a3b
Range Proof
672 bytes (Bulletproof)
Memo
f2c53e3f5d6cdb1c7a534e3e0c626c7aabcb6eac7681243dafb5fe7a228ce1040f493ef53b2268601743d1123d5e7d262ac515a3761944974f48699818dd8e50026e6e3da93aed71dfebed0a8941964c05d0be157655bc80c60c9b9222ec1daeeb89269a22f787c678a5531e4e1689d6d3548829a04d62cc02d161fad517dc4c (encrypted)