# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5c1bcbb9f45b3eb7128a9e8a81f9026019664ae82853528454883d6a48382730
Pseudo Output
bcd0f1669b1c71ae2270fa814a89ef6f2d06758104ef1e71b15399cf5c41b40b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
baae00ed8dff3168fe34cb54037f2c6f041f2c452d1b5f887d67e660af696116
Commitment
b056fed240a69eb6fd5bcb69f0ef51ede87cfbb11dded0bcb93794dad1d66739
Range Proof
672 bytes (Bulletproof)
Memo
7731c753318d4efdbf3111a706e88b626304f45121b03813d0d10715327df5820ee5a0d095f2f93ec5a0838e1f0aa3c0a61843f4a9c06e64e9a3c5af06af593b9bbaca6f1525a767a31d1905e4ab41768adfbaa3572bb9a06f729a6eaf8382743305740144c19f47f73b012a58c8d083f1e77d6a4c25f0e04fc1106c340f3648 (encrypted)
Stealth Address
6063ad67b91a1886d5f5cb60e68c2acde51c7d2448478dbfabda72eb4756250a
Commitment
669965fb2d6aea619679ddd40c02d7e7f092b6d336121be381b73cec04240353
Range Proof
672 bytes (Bulletproof)
Memo
01ac9aa881749c9066569543f0982778bc938d5a4a0a37566bffd2e2227c8e292b7ce24327964c2b631a5fb190f81bf4fad885757c2acfaa72c5f72948620eec0b6100dfa3ece8543a378260790894f4349c407bc8648d0b4e6e464aebb28425a3938f9ea209ee361431fe9d3ab93b64c3f0a9877c8a37f282af32e1b0846c88 (encrypted)