# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aa60680da48decd985138187d0f1ace60bb7be2045f1942c18df50192253484f
Pseudo Output
b6f890c0b313863a2f1ec66505021cd79f726d4110f0b59675fdc40ca724e126
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a272b62f15b5f25f93c6e7786215fe30b3d25da9100f358cb95be6edaaba430b
Commitment
cc37068700d74cf56b9f8a235f6ea2ac976a25d3a206aad3fb1194b3c45e276c
Range Proof
672 bytes (Bulletproof)
Memo
5c5aaa9cc0445b27b61c83d9ca02ea0155696fcdff916978a9038fd599c49c92cc0ee83b7cfdf7d7c14815c830289687938197fae81b0b4199fd94f47efaf8d457dca4993d28b32976a2e868f77214c7066a59817b63c0434b1e416ee56ed754eef1e4d73b00c7300f8e00cf4735331681b7bdd230d581021a87a3faba894855 (encrypted)
Stealth Address
3a3c5a26023d5bf2a7760b1564940b12325e92441c8a8dc70506d4fd9edaee19
Commitment
d2ff56d7ec09b8de566abf5156d6187105d87475b20b4f27253e9ec11b1fcd7a
Range Proof
672 bytes (Bulletproof)
Memo
bf20fb8ea3d127846491b01c0a968ec78fef12b38d3ac24ad94665b6692039e95a44b3c3bcfc0d6dd84bf172e83811fae5aa41fa5819cffc0746f6dd9178d8a0b06071a05b33ab7a4dcb58f4205f9b6431df372840eed22e5529f32f67c4704cf8ea579c7118f254b1426647d08ca8ee67c0214fd654c2ea074ea427d9378a76 (encrypted)