# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e45eb0b5431ad1d23b7e3dc161b9fcf29a8c7a01ab0e8ec6f20aa22e513e703c
Pseudo Output
c4d043ec310650819caa60b898a266ed3ee9b4bfb75ae6dff671883c6d301e7f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0e6ad942fb8d86ff3f79a43949341b1b9e0e002a274ebdbac79c48c93430d31d
Commitment
7c93357548699cb0867d121597749f39fcf937c6aa1fb3f4858a7c2c71326b69
Range Proof
672 bytes (Bulletproof)
Memo
c01ae23e5744832e703c68178546f536a69d61ce8a654af0af6adad67827acbe334f03cfd23232d6a58350cc9ffbcec6f26459cfee08bc35ba8c3893c743ea27a767d16abb6a2f435e11800b1dc320533aea9b6f9ab3e215f5e8b315cf507c49a75f64ba0af445ab9da174a7fee261a2ba11f030bc6f501e85503388230e5aa4 (encrypted)
Stealth Address
9ac4cefb783392b1c42ed618d64b65989d42fba452ea1ce5c797b7310a9f4d5b
Commitment
9c7dfea9802e7598a610b5c90eb8f0c3e69fe58c862ea877652cb009515ffc1c
Range Proof
672 bytes (Bulletproof)
Memo
4b0edd4310d016a0f0586c22a0f23889b8e5cfecb6707f3a5c5cd75f714b89c903b8988bdb43b6d47cf4797f519e77c05d8f63c49ce23dadee7120cd0c90682b4ef768930dffead69ee4ec51e06be62f1cca9745b4dfa1ea1cb5fb5832ac680dd70218e7ae7be32025ce607da7d85444914646461fd050e28cea950624bfe125 (encrypted)