# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
acf7aa6fea4664f2212b0d9e5df8377defd32b80ea43cd9a2d7ea903aed4f066
Pseudo Output
dec41bffd7c98311d977797aecb5c2cb63dcd3912d0838d19f13d91dc5c69c45
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6a51ac578f4a01bd2282872e5db0e5be468e42704efaf4386101cda72054bd0c
Commitment
5616e0f85ed17125d2f007b4968b402ee7f33406daa91ddb90b68a312c02d263
Range Proof
672 bytes (Bulletproof)
Memo
dacc24b7e3d8cd985477aa61891ebc943d04d0241e08c8cbd728ddb2f05642419bc8872bd292045176c655340218e741d2cf85a3157aa10eadecef87d002c102eefd91e9c9f53fc401a787689c06745f4b74ba5ee135ec2fdd80825aacc710c22d85d509d79cb8da63fcdf674bfbeb811ec8cceb737ce48d7b694a2a4addd26a (encrypted)
Stealth Address
0281fb9c2a1f928c1694e226a6af1a87ea72f25a5cd3125c7c3da1426b435806
Commitment
4ce481a25cd611c5419ce1128a991aac16b1a9d884405a6e847982895becf364
Range Proof
672 bytes (Bulletproof)
Memo
96745e9870d9cc3044f010fd46ff268a40ce6a2746543c0f1e42e27be9cad23c8351b47f54bb786623f8c1a117b1d01f93a8bbeebdc7e9db6157ecf0d47147f2e3018f461dd31bc4155290793fee2c6c390b70ce34efd5577be358360b80136ad354467a634a8c974725ff037ceeb23f10aee4cfd2de9f0f31cc9f56e57497cf (encrypted)