# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6a732447c1356f5f9b5e3d757c0c86dfd69710719442bd5cc20b20e3e0415654
Pseudo Output
a43641fe55b045e0ad3dff05c438ea2e3e2c8d5864cd2a0fe82331159fc6271b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2c96efec505fa8624c1242d9945daf56340249255469be0d053f03bab2f86a31
Commitment
1a65de1b63a7e79a12b1c9d6e11aa24839158c59583b80939e6cd42a927fef7f
Range Proof
672 bytes (Bulletproof)
Memo
9182aacaef49aa43066f2b4f4a4f367ddc6e987e92a544bb8a1b16e5cf9e58fd3af4bb542a8ac801dda02d1ad02ffa8df09171869bd4db6a4e4ab1ecc56a087ce6ca0d708ca1602f8643f3eece89675f017de072958ddd6ba0f1dd739c523c0ca61f56b0ba78bcdb98cdf94bcddbd2b12d53a863705df4310bad75f681944ddb (encrypted)
Stealth Address
2c1e91d58266fb57b782edfd46b38103e66581e4a0f273e3da3c87b38bf0690c
Commitment
b6bca70593f5d907eff482caab5cfb3d6a5f73617c7db28247c6935cfea2587f
Range Proof
672 bytes (Bulletproof)
Memo
bb330e2e72db40fc7e3674f000c6bd3637326a00654d7efcf4e739c7a4ab7d1221d77c21cf7dbebc575e465998871ddd9c244c370a4e78172f0e3f3cfd4208450d8f696493d63c178d6dd46b317283a1ce3431bb684906c6137e1ef2cc4d2f1bd48b862c37ac20118b3b094235c48ecaca62cbd0bf932573bfdaaaa54b89f391 (encrypted)