# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d8c92c18efc1b6ff462309334199374b37edffd9f95406ec982c288fa636226e
Pseudo Output
40fac4d9784ac3f0bac568b160e7584f7db8efc22f81bada06cefa02e1dbaa0b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0a422f70c247411cc43eea1d095115e3cc5c71c3d1560a9f3d35b72a39d1ac6d
Commitment
52e816e45fb7841f502cbc066363e37f99b78583c7117cdd382b058647596223
Range Proof
672 bytes (Bulletproof)
Memo
534ee9b6a41ca924e2f9373c7a51cf8a31e7160e7630980ecc9a9b4560af38b145dbe2fca6ab64d8269f678ee9ae1a7b6100f72891805244b8bf6941914126c12442df49fefc44c528fee983e2db32eb3d382d6467f607e9862f13ec4b18b4808e6bc8b0b4e726c0760cb81753e68a7068ae39696aca5c446d32646a945ee5be (encrypted)
Stealth Address
74e5a2f8d969b0b4a982f139562cbe4c134b034e9c4d8dd8aede4f039f35d223
Commitment
247a1b85a246cf6eb7c4803547f08e2849aedacbd3f96dcd4ffa29891bbe7b36
Range Proof
672 bytes (Bulletproof)
Memo
955d42be02095f54a786fc1797aff107e6be1fdbf53bdbfa033811100fdbc5c7d4258797673f19ba1e15ba24108a52b8c640c63e44de21b1a15c13b5dd96b44f7596635119d95aa751c0c61f29ea17ed40adce4bff4c7cf60a552b9d2c649f558199bab5c9964948c546b42284d3bd3da6701132b461d0d41c7d2e535fcd773c (encrypted)