# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e6b79e865e614ed72992e817fbb090e9d00bca6466dbec2bdec4ad101b8f8301
Pseudo Output
806e367dc5e130c120bb7938c664e51c051ea5fc3d24d3e6e73ecc88ea30a03c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a0df52486e6b632f779217b1f296ad8b45155944fa1d8ae0ca6167c84c38eb43
Commitment
a8081c0e26118c4c0a632c1a0c595b8f10e2f1a0a15be4fb7ff640329333204f
Range Proof
672 bytes (Bulletproof)
Memo
5a660b472b9a8eb2670fa9b019f9029afcdb86aae6b4ec10cd6365458b1064b45f4028de6a80ba07b5f0826a05dd6c8359cb4f34e179ac0a23235892b8ac0d2d36ab374923dcab3c3b6110f514f3e6eb38f1542ec94dd0bcb4993f7f860aea7034182560ada505520cc9b6d5f6c59bc29b3400650c69db1510b566ba2594ffe5 (encrypted)
Stealth Address
66f1894c664d64fcd5495ab0d763beacda45157489fa10fd0a49132624aec103
Commitment
0c12447642f004d6bb16653e2fa69c394c3e7672d8ae91f22eab05b638db624c
Range Proof
672 bytes (Bulletproof)
Memo
99a0b8cf3a508b0980d323befdfdfcad8061fd519fad20ad6338269882b59a0d5643c50bdea3d0b7d540a681add3df04e57fea2ab8e7d69b866b9bb793601f1b9f2d1f3e15ad4f1601c8297e5974a47b64bace7a300306ddec2f2ea9ce214b1084e65c43b2e5d93e79256a132a6d206381cae962a896ddb101538690d8e53e5a (encrypted)