# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
649fbf533a0ea1c1c111c6e43b5bb1682ff5e35c626e0521c660fa035f329366
Pseudo Output
60ebc2b78fd0c746c570b0f8c7ac321d77d260ba85ecade25fe9d2e4a0f8dc03
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
34ec154f6bcae52a2a4c2a67d24ee271832caeea021faa63f95347ef9a089159
Commitment
c6417fb9c6a878b5d95f935787dec228029393ba97c2ca07293afe193694db0e
Range Proof
672 bytes (Bulletproof)
Memo
c71cc69df485526d648254e7375acb4fbca594f1fb6d471af2446e82fd64a796a2cc3a2c6d0c55e453a3a8062735877c8140a6274a270c9558462e0ef99741d5d0c85a7c707298f6206b91b54e9512e76f7e157d8e050b39781129ba35a8bc34ef9c1fe0a70b96a8abe7eca671490eaf1cfd75b12101f726c4acbbd6c1d5c568 (encrypted)
Stealth Address
c62c68f92462386cd2270dd69ca658fcb5f9f4ca78df128f9bc76b3452af5e28
Commitment
c050be88db1fbe47622e0823fe7c776b47fc418b6f72dd88345c51881fe2944c
Range Proof
672 bytes (Bulletproof)
Memo
f74394f97581a0602834e8cdd67bc9cffd8b1a09eaf3defb01789234ccdd2a5b536d80cae87fbf1611c93a47af215b9568ae2122153db2f64f98e2bfd15c47890e188acd6335210fcbc55c87646c645508eafcb9b6b4b24d5bd899ae64f88588893d5c0f27ed960e8b3948e6e5fceb7ce5604f8c98a6f7e9933d7a294b182e4b (encrypted)