# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6c22816c8f0489f8b38f0e4478d7c76ec964eceacbef6a27612f9bd13845e417
Pseudo Output
900851e6787aad91aea559c5721c4f4d336e2f8298cbb929640994e078350c4f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
381c30ef62461d56497899e0a7752bdde5a3c1710a92bb1a5faabe7b16a1747e
Commitment
0e5b55a091ec53881983cc50aca2cb7067eb8c72573ae243f3a2c09afe8e8449
Range Proof
672 bytes (Bulletproof)
Memo
8bd22377c246bae01cf8b35c24e3fe944be115f04a0215f561045941db2613bc31ce87d9000d536e922c8a8f5bdb347f7c6d7683512a83afdea27e091b1aa0cd1bd80f4ac917a5c3b9d56ab944fe23955f3b4f9524b392318b7b7b53372d2223ceb1c1b152cd175c256ce63dac4106714b54f990fcb4fc3de6fce1520b1b3385 (encrypted)
Stealth Address
8256aa13e925a738a2e469701d6bdde36a308d372ea98b4418376c5728157977
Commitment
12338ac2ffe6da98f6ea9842c57206531f9fe09ad12af18a53a2514ad01fc522
Range Proof
672 bytes (Bulletproof)
Memo
39f8dc849608210ddf81aa2832a1a3f2c6811e7d927164643a2624ed9f8e873095bc4c8588d74bd71444460f166461d1f512bf564b832df8b79de32f8176e85ab467b28d79eb13e5fee5b74e99641262b2dc8c21e863fa3f4bcc146f030f902a6482d8b204c9cb44486c49d384089d66c115f9817b4f1769467dbe814b81085f (encrypted)