# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
be7356f2010692ddeac49c4b60d4ec455b4d2b5447107c55684de4cd32583c75
Pseudo Output
f0cc384ebe595673884449aa2650759a8fc73a180327bdd5e319b40639c9b978
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fa038b75c58ffc8832079b77ee35db9b4eeb4a2692a5720eeea7b57460b29a5c
Commitment
3c8ac2bb85f14ddd6e7318ef8f4f024bb2c0f09fa0b6050e4a5eabf482a04e0a
Range Proof
672 bytes (Bulletproof)
Memo
ad6906ba9188a5b5dae2c6086943186e004ccd5173862d637347a3ba9121f7301290cbc12ffb9f965036f3f3b881a2ea8c34cd76f37ae6baaa763992d3c6b4cf145d721642d9ac73ad9c0567f84a5da447629866be97b3a57a2fbf66c75c0c8b2fb46c98c7000dfb60099b2e49155bd7f44c2556e17cf82e0bab19cdb5f0519a (encrypted)
Stealth Address
dce9d5656c9e1f81563babae0e167d3de16734c79efb54c74c2385eed760491c
Commitment
ee658043dfa506e3b84d1bd5495aa5ae28b8beee996e782fb31a24e929eb9676
Range Proof
672 bytes (Bulletproof)
Memo
3b3e14254568f65eac7d20af47d9ddfcc77277de6b755618dc5133b9d725a05794cf939adcff66aa76a7000021989c7b88eb1e75c10aa4bd42cefbc6cd2eb8904759b4752c2fc1825880c3063c783d520106a0ea92468ed6cf25709ea5bdb14be1aab25db505fc7b02b7c1a83ad22e4d6b6876de7bccc17faf6ff3e4d1c4ad82 (encrypted)