# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
cc216b574645e5236f7aa2205826bb8da0b37c4257d9052c8ce203dbaea92733
Pseudo Output
e60bcfec6ecb9a622b62957b27d3c754df0d49e54cfe9a322c41c5339b89c211
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3e5b5aaef2761721cace50a36486322c0eedf1237b52f9bcd218a2afb5f13201
Commitment
7ada383deb112652aebc7e9ad478db00de672f3eda61eacf851944ea3f643902
Range Proof
672 bytes (Bulletproof)
Memo
413e119f318d317effcea27422cd9c5a701814d91448ea9612ce33479ac5c3dc633e225eb0668492f1559d3cfd9db03b1fcc774544e618aef6c5cbabe13683a776d4721e663586762b6f3e88cea66481a4c1fab9084a1a333299b3ec63c23e59362460abaed35f306389e265570d101fc8f45f752c9012dc0da5f548d452fa49 (encrypted)
Stealth Address
0cd397104345d38907245e965ce0016ef0513e070f29fcc8f7c49cd65bbebe39
Commitment
2ea0cb9ea9d2da63b5ca2a9e3a1fa0946f453ef9ae603a97c369a342ff308527
Range Proof
672 bytes (Bulletproof)
Memo
8370e0b557729e68346106db29ef01b44ed99682025f00d9c6f184428030743bbda0a4c84892bf67b7f4fd57adbdedea07ff40ff15b8e8ffb821c26a1976592beeffd1b8d38b30fac828ba042043fb158cda7edfbb9263f33131f5a1341487ed3f378055208f8a2030b488bbfd61d7b9dd5daf045c5d088843373015ac2ebc84 (encrypted)