# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
dcdb43a1d50c244c92fa65c1f0bbaeb9120ceb27d3a40d6ac2dd2f10d7ce6340
Pseudo Output
a4ddb7ef8149eef3098831016ca1d06e688572fa45abdebc7583a2c543c59829
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
160c8c2167d401a9a6231001d4d4ed27c5bcc343cb05dc89652a1f2b662c0e0d
Commitment
900b299833789e94e6ab5c9485330d1203461808b958056474aed312d5891645
Range Proof
672 bytes (Bulletproof)
Memo
38dbb9523be34ba325713bcf7a0684468400c37d94c88e9025d6cd27fd6b2c3ad73cfe0f036d0463842446a28ccaf8df7b4a3bfa70a06c92a07904e2c9528cbad8533154b98ad0dcf757495cc1acdaf178e9f5e4b775fb7a538899b340e6f44dd9004a363e984947f8236549fb79ed81ebf7878d6e4d611030edd3f20abd75cf (encrypted)
Stealth Address
9071c14badedf1c50ddb8ecd26953fc4c4971f73309020b6a469cc80d9b4e17f
Commitment
6011ff9e25bb69f80385d7469995964b7675af1ad6d3551f0279d333e1ca8b13
Range Proof
672 bytes (Bulletproof)
Memo
de0d08172b4a946070ca3dd051d7b15a7ba7ab8c801d953112d37e8f45aca85325084c3645e31c475de3dfe6d2aac93ed9781ea5794867cec806da99ed130c4e4cb374f3e4ca00b9e847022ebcb51c4c1a70e1beacad4c21ca91c9e652b70d2c8b0e28b9400fd35f91fde9c3b82b3df0cae13664ae24720b3c7aaa332d09cc4e (encrypted)