# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e6a48677bb6fe2bc88fec43408ef4a65dcc292e947d80b8b66103f235357c669
Pseudo Output
ce4bede75d8b34c729ac8fb78078d7e9ed158fbffa6225180602835a2d9c1225
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
aaceca4a47473e31e68cd990ff4ef74d4dbd369511db4d22210b285a2d7b6c58
Commitment
f2b061e787f442638d6d5da61a5fe1cdef1799d8edd8d47bc7b598c5ed60d603
Range Proof
672 bytes (Bulletproof)
Memo
4482ad923e51518b9031d18a74a707879f4c73526611f6cdf2a70ff91a36d816ee334be07774bd03c06fd1a7150bd809b7927a586daa9c79460dbed8e0d5c01f70fc8526c2135323d5505d6d0bcccd90c48e3ab4a411fb7c513036b116faa9eec77048b3e56a3238339b1fdcc60feb0b51a3cfee824c5beafd493a051c064388 (encrypted)
Stealth Address
bc73bf8e8adffd0eb4b49bf4149e9f29191239e407016f4c947e1cabe9197d07
Commitment
9c067d892709ee983a0ce230e2c3faa4f66bec3112e0702c10a5ac192ec1ca08
Range Proof
672 bytes (Bulletproof)
Memo
f0fb2d279772ef2fee1b38d052d100717dd959a6472b78d31eae0bf50b46be67dcd65fe9ca43946413c4edce04bc1cc282abedfebddfffd17971b78cc5426ea9d09df1b0f5311885243cafebfacdb37944e907e68401011f3ebc94c8fab19d124c8c7ddd5086033dd7683f41ca3b4a2bb82bd16780a24909b3dc7fd26f27db56 (encrypted)