# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1424a606f15603928d92c776072441049f130d7c240f65f928eb70b89631595e
Pseudo Output
526aa0b68a2855f72bc6b022bcea85c1f52480913f9a8abe6dcac2856fc27a3f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ba18ddd798669421394db2fdfdaec661c40f623b4946e6021c176e5670287d79
Commitment
242c52fa2ebad87a3960b58de267cc14c0f20b9a321bc310afc1efbb79f28d75
Range Proof
672 bytes (Bulletproof)
Memo
29e347638f60241349865f5a04a79e2455090f6282f62b730f3f600f60a978ceac054cac2b6bcc4f21eaa7a2ac6f4cec6c7a41f494dbfbe1d0a189179a51c1a61bfd0e8b685eeb6482aa5bb0828212e9408be0ae6da0d7c56fc5ab98109d6c688eafab357387ccb1966b984c3f277e610373c70f10279c57e14e5e154fb72420 (encrypted)
Stealth Address
5856db7dd715586fd192ee7a814ba74afba6e427b88838d16fab7ce152dcd92f
Commitment
b6e5579baafd89bf0ffb046d48547c3bb856c18eefafad04bf4d732d0e4a4b39
Range Proof
672 bytes (Bulletproof)
Memo
766014c5c61fc3e62ee7ec2a521f7e2b748ae1c73fa78f9ffbbd869a786307a3718073118311aa5bb5f71c15b77c53f28eaaf623f71eb1f984560e60c437e924b09e69454084040916b08cb7940e9ec2f097a4fd37cec834c65098723c3ebc98c2a34c16d3c5a973a8e0b230aba5bde3759004fabe644e6a50a616f5cb3e7814 (encrypted)