# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ae696b751caead2ca61b081e0f7deaf55b3137c1492af676796df9aebad07956
Pseudo Output
fed29d0d00638fc52e5514ebc3035c11d056b11cdbc47687fd3a6f106c80b16c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
faa5e980a17d4845cc81ffada879848a84c771fae0398dee303e66ec67bde732
Commitment
1cb5ba6c0307d1c38d1acdd668563c249d5a3e332c1e30157a778160c0b72c54
Range Proof
672 bytes (Bulletproof)
Memo
8fd8cd842e657a05971776d4a4cf3283d99ca020529b389f29b89239c1c11c3c9e28ec49a68e6a02a4b8aa7ab7f000ca6b7e5555c7e48a966a17e3374f0c8c8660352d53d04c5c337153a4cedb850e722e81f53245652cd0a1c424e65022edaca652946f753f772f7d50c565fea2d5d49cd510c0c4cd5a238535daa4fe1031f5 (encrypted)
Stealth Address
8a7e250ada28cb2d341e276d3fc02ea40be42d1d6d90710930212694f00c7612
Commitment
eceed908885fbbc2989d1a25b2e7f2bf6493ff5746ab733cfe6ba4487fafdb1b
Range Proof
672 bytes (Bulletproof)
Memo
6dba6de1984a90b0456125e9de5718b0a493a4dc58801810196662fe6e46482a3361d199791f236109f117114d7ed342132e500ec9cc881c6017e2b53aec63a47aa1183ffa15ce9bc04868f3bd510df529b7b7b3bc777440c731a862452b4e89c40e1849ee7a332271000525a60657dd1998e56cd1740db652f66ed9779dea3d (encrypted)