# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2e0297222f0c28094d0099b2886ae24cbca87da93f4eb3cab8802d7de85c6563
Pseudo Output
024882a25a7ec86197f7370c82d4f704e8685514adbfe528e94edb9f409c7a16
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a4abc147c95fc30c7433e18e0c01a9387592cda78586fd2e7beaafa17fedeb7e
Commitment
f887adf65201e16b2af3c7686814d2979c9d06e93e5edaa464af1d87de432451
Range Proof
672 bytes (Bulletproof)
Memo
5384d65ef7cc543ad6f365e25c14f9bd475ce2edd1696b414822863bb3ac45ae067e08dab5f9c4d3b7b75d7e052cf736fb6111b8387492065a346cf866f5d0853d076a343528a670822bd494b09b4ba6abb970385e0b4020500b15b61d5723d2b613c98f5629778e5c794713c8320e0c66ae48950e44700cc61d67d7d6555762 (encrypted)
Stealth Address
84fdf071ef8b69284a7850629f7837ec4841d24a28e2fb5bcbd0db368833e60c
Commitment
404bde83cebbd7088e6935b3c1e0ecfc8b0e97d0422edd435920a81be7ffac60
Range Proof
672 bytes (Bulletproof)
Memo
56285e37194159eeb697643ec5fa6928f8aea60ed4e5c3f16df2d17fdfe20dc3fb9db90a3ca110fba066b1f6f19c11a883ae804c0f541fe5a6d87e4579d87a4329712e00cba96e6e980e0ebb7b82d34266813ea19c2e421e430ef2c719d6f23e989f26f96e27f10a9a96bb669d6067e9ebd90841a93138bbc43724fcb46552de (encrypted)