# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a672d70ce915bde350634bcab9a9d018f07e2ede63d6ac13bebe6187ac678652
Pseudo Output
e4fc0cf77f91aa3a0bf9130605888d90e97e1d6dea424d39944f533c246ab703
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a448662dca1cd7355241d18f092dc15fc2d5e9aa03cc7f356f71eca05d510f10
Commitment
2af80bd74f7efddc88f965383b231ba002c3da4740d585c1d9be28034ca1714a
Range Proof
672 bytes (Bulletproof)
Memo
1e7944b445c068abbc4b3d73bf981fd49af51b934e06df109244a93bb74269c2b378cabb203fa7904afc642227c715b697e464f054ca7b52b36a8bc88262ac3f0b4442cd0072c4289770ca45b7c3b9f35cf5462773e8b277832802f5e3145be764d1619261b397504828381d3bfb283ca12e06dd692d4eac46ad2b5646a74edb (encrypted)
Stealth Address
fc9a66a0a83ba51e3adaf1dd3a1570bdacdb33225d13784bbceb3bf7368c664d
Commitment
f8d2bd5dfc7d52ff68eb5fa4d66e1c672e2ef2fa850d7fb48feb440caf1dc15b
Range Proof
672 bytes (Bulletproof)
Memo
ad255158ada08daedb83eaf58a8c057c045b828f332f372cadd467ee3ee1c087cfa3fdeba724a539d7cb882ffc0257b84cc7d3441415cf0305a57662f1865cfbf2540c0af279817eb883ab6ada177e2174b4020a4f665b8743e87fcba0204c36bd1c0655b04578391cbe6949109c8bc4fdcdf83b6a369f7b6a68883b4a539925 (encrypted)