# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6078b2f5e32c69c977784ba52b59628b6ab031ed76630a4469ea92830e84dc3d
Pseudo Output
447c6d31d7d27fb129f5cc2203ce97c8069eb86945dca1ddff5c4a256097e517
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
86ac9ae14cc9fc9ebd619e2ddce595d0d427f39fbc46016b7dfda7c417d8182d
Commitment
aa78b9ca80d472648b6123c0aacbb8621d18a6db6f109f506d8746fc169ca145
Range Proof
672 bytes (Bulletproof)
Memo
940a2f8506b394d61208702bbbe2c771ec02b7c69e81549e3b2757ea071698e124f99a7542ad0ed0c1e90dcf07a316db10095c9f80a72020ec51cedd17d531b19612fbc060313c2e555b0d414e662c85df25a94928048cc302a06209072e8202251467d2c287f7e6bff762fb0015652757a765aaab27c0bf79dd093f66f33b7a (encrypted)
Stealth Address
3e05223dde3e454999cf0a19f21fa6a5d60305ac6c5e554fc5de862e1db1ff3f
Commitment
d01fb55db7fda28032cd8b7b936d73f28abd6b7ec92de1670001620974e28761
Range Proof
672 bytes (Bulletproof)
Memo
cb77e18ea29498f09385978bbd02250132f0f2cdf5e2022df9ddfcf7de18bf19b6af5ff9fa565c0fdab9e632b8e32ae96de41aa12388735884d28985190ad143a242b8c83818b368adde9e5a3b6bf65b03c97d5d796fe0aa0af85b7e5f6acb36f37ad1600d7856370e090f1811269faf234400a3d75cadc9e2c161b83c3dcfd0 (encrypted)