# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
144389c9c8580ac7a2aed5ba76c242cdb37b74c8c1c82e29a5624bccabcf0310
Pseudo Output
fe2c9968db5ff23ab03f9bb80878074ee8a9b07559af6ba990d01c96d467396c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
54a333e8d1bd0ea2d5e7ed31c7ad966f3cc4fae9a61b351eefb0496aa6900b74
Commitment
3e1a2f87d4aa543f40cd48bc4341f390a71d7d8c9efc0b0755179ddccbf97074
Range Proof
672 bytes (Bulletproof)
Memo
6bfad1840c0e11675781d11f782c5f68f6daf16b7d3b1c5a5dba88247928cfd6add148f5bf3b13f6cb93c006a54fde4b80068056ef2d4908ff20f8d91b3e71cb6ceb12b4690138610246c28b1d800c97018afd6d749b54017d7d47e0602854c89309c870cb85a1ca39407f69f2ae73d8d0f1ad9a50761659981fab68ea24dfb6 (encrypted)
Stealth Address
6a5ff56eb717e57a4e99080dba1e153ca51d3cc1fc8d265d01601bef470d7c2b
Commitment
78be0768ccdbf20e361463671b9067900554f7a2563fa243d04afe6560a7da79
Range Proof
672 bytes (Bulletproof)
Memo
a5f66a6463f306955f4a01ada8b5e7caf16804cd28bc50309692242ddd8b614b6a824602d6741bb7be45a3f7c8b14aa501f973a050c22064b58f6614c1e549d46a6ed051af83ba89c2d6dda0e07c7cdcce2d5fa053fec9a55d56cf452d6d3e1fa443766978c113c1ec4b503ae4eaafcb65a470dae50f0fd5a1820a3f42b5c966 (encrypted)