# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
90e7ddeafd45e1f12884a6c2c93c761ed707b2b6708db5e97e6406cdc346cc2d
Pseudo Output
ae6d669367b74a98c0edb6613ad1acbd8153b75bbf9aa1c16d95bb13f6345078
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f883ac183a8cc7430136166eb19234f587e1b95d0c357095b6c55bfc7c4c5912
Commitment
32ebc95a4094649644fd6e3072eec2f1efea262d9cbc7a0766fe7e4023c43846
Range Proof
672 bytes (Bulletproof)
Memo
54b7e91abdf637f23ab593ed3c44c803f2ecdd7e69890a33fbd990441457a3210968eedac05d8a58938f4b1a79ac52d739fb65e5fdc5427e5a1c4ceeb3ae875dd3c40c4611824626aa7264afdac672bf54c5766e6a4b01be73188146870e6c8e35324dd941eceb08f45b241038572fe293117b1fa9a7a40568f9e86d3b1e073e (encrypted)
Stealth Address
787c4f93dcdf5e0472d0df5247f6580e17ddb98bcda2fbcfee7c95643bc59f1b
Commitment
ee75c168e02c7791878a1a2d6a382363e3e8640efe42a60e0e32a92873e8ae02
Range Proof
672 bytes (Bulletproof)
Memo
54e9eaa68b6cc13d4d0ca83bcec5ed431331d9f7185fe2a6930ed5c6691a2e3752d6806a8f8e9a807b83d8428ff898c85cabdbf4f982f97abac12cfd9bd673ca84c358dd41ec0bd13b5bb5657fff7519aa5049f7c0c4609f4fd95283a6e2767bdb04bf406dd27d18a1a2a9a13eb08424ab6f504c96b16b57e3c0442c1ae75bf2 (encrypted)