# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
444eee5d619ca66b5d0df7d322251cb00dada55cfeda78f25764e4f91b06b26b
Pseudo Output
ea6898d743eef0e1f2381008227695740d71ada27645fe381aa32543d5f8c145
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1c91f89f496a49b0de1c5563c4a1fd72b253718a8a1ad11cd6f4018c88d4fb17
Commitment
ee51f92f31612ddfe399fe86abf2c6996bd5cfbe570010ec2a35896c742afe6b
Range Proof
672 bytes (Bulletproof)
Memo
bbbf8af8e3609a6acc90c1c6ee4a33b2491ae1ce5aeb03938dbe41662327baccff7daa1965fea5f4d93b591b3609638e56b999acb760bcf4c62f7e32fc397a975126fd38050a2a762eb99624e055d7f0fee24ab2ca27aa4cd0cc72aaa0cd855af9b8b45c2d546082f37874358ff32a22e30d7a58dc3ce4c49295adedc71fcdbd (encrypted)
Stealth Address
ae61dd12327e10b79338f43f76680a20da55a48c39b869353a84587a9c88cb7b
Commitment
a2f620e901f4e49e2d85c978083282af37fb1d37a68e7adc4f06a7eeba141014
Range Proof
672 bytes (Bulletproof)
Memo
ba00ecc465f6cfe5cd0af4950f2852d3dcabf97a20cf2fb4524c0d70d8ab561ac6f417fb410c41cd1537bb3313b94ff45493d225deea56023dfc7c1486dc43f30da45c0621dd3060881e3989f43bc5a7b5c23ac8afea76c97f33a36a7c1e00b567c44c241eda3278e28ccb7618d5af6e2d8e619f0c1ac4017f8cdd11a0328596 (encrypted)