# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a8454e8924e6b8188ff1e3fb9986107829439a5b85c65e2e68e32c342d7b9645
Pseudo Output
94655c10066512b1f9a7e610cc529472302b78834f360bfcc67d678ef3ceb510
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c43cfe0382f4f9b19dd83613b59bc8d3927f093088ed5f970f3f426f7041253b
Commitment
0cdbce2f128942cc435d6b31c23ef5d2c0505d124f8ae7c9cad1fa832c561765
Range Proof
672 bytes (Bulletproof)
Memo
89f7f70cd0f5f9e56aa9efb46caa95451f669a1bc6da4ac1eb38e96b891f61af87b27d19d381d19920a452127b3bf3385c0498cf93d362baf5e28b6f2f3ea5cccb1a302917827621d45ae67b95a5d0d1c0200b8c3564d1286983be63e00bf11f769db00fc7ed49318004175fc312bb9b09e57b916288698e3c22cb35ac3999e6 (encrypted)
Stealth Address
aed6de3d9f94803a2dceb82b23c9f4f3348f5fd6b0ed01c2c5bdcc7d35512577
Commitment
a0f1d4353e662161fc36bc6d6715f03836e5f84f88d7b06c51caa0b51c109252
Range Proof
672 bytes (Bulletproof)
Memo
783dad3d2736e3363497c558c39fda893f1075c0ba2b20285adc450b4222a7979ad01fba11e70711484163d26649b863e48aa5c1e4405b6ce9acdaef4f8269e5d77d1fcfcab74be8259af31c0c5ce19dd83d0659b2a38ad5ec3dca178c059d4f24ddffaa75e1ded7da5808e5398d0a07a1a433db6174b6cbe9b280f66a87ac8c (encrypted)