# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
141cc297f436b44db8910086e46797a53198d70eb631b732253ea8989016ad36
Pseudo Output
f6840ba6c5f2c574dd39b085290e51491bfa3d98810375bac40f9dfc0e5dc97b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8269b0973b7ab504fd1db72e4a1f362a75d0520af81744eaaf42ab20f246f515
Commitment
0ed3354e41a55899dbdad10449abb0e2ec190d86ae3ab3c5c059f312a45a0d58
Range Proof
672 bytes (Bulletproof)
Memo
24c1e8fa0516153fe11f63c95b965b9273ba034eb0670b7b73f47c0c5451b4e7f796910619b9e08497cd47e5d7553c8882b083c0c3a37a4740b25f574092d96cc639f280787717d199b016def8f30346fd64f3f953eb0e840cbfef7bad8b0beea1107bde7ee4b9a0065c8a6a32e88235ea17b18c69170f42224cf81822c2fc7c (encrypted)
Stealth Address
c68bab9c2c31e2e985934d41067b9674d231b4a5e11819e6afeddb45a1ec4432
Commitment
926a6235ece3a8fe279396bc46eb410821a6f2e584abc3d4d6b12d5e0808675a
Range Proof
672 bytes (Bulletproof)
Memo
69b6711f67d801e536d438cd9a12033e867881cece58bf2825940dc20be06eca29a0300d29eea6de048bf6c23fd948c8528ed4bec9ba905d3696738da79a22932dd1512deb560c7f32e17d89b65a931c95fa74b6f2843b0afad92a7db64a3c830044566a109995752d3d692c9559f237899bb677c4ae59d597995ecab7d83703 (encrypted)