# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1a883d0537b89d53a499660fbc7111f9a3689e7c74df7f0aa0c5e9035051dc48
Pseudo Output
b824e25ae0438f804397d7410959a3f28629bf0bfe688e7d641440a0862ab048
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fe35992d6a74c203cc8cb1bb4e310be9ef2f9968a6dbab2ae9ded3cd018e0550
Commitment
2efbc5a0cd976fdec4da2508e6b9fa5a3b6990d96882ceecdc4ad811ab5a997b
Range Proof
672 bytes (Bulletproof)
Memo
16055beb8c536b9b8e97d543bb7cfc826adf3c3c4c8efa5479c1eca957d759f6f4d4735ca5ab4cc45e550237037c26bcf7a82cc924eec0705d190a07ec5721d04d94db699c5f8e70d796022c5b1d93afa6954b2400a306213545f35c6961c30c487cd7da3712a0a1921f3d67bf6cf9a24781a5a57361066c646aab79873b1482 (encrypted)
Stealth Address
98a8868da4c46ac6e9837ce261928b9a87353711b29864c9a844a34d4cb8104c
Commitment
245227fa11ac1694f43fef002f9e52c003d58551926d194976bbb6d5f0b7f525
Range Proof
672 bytes (Bulletproof)
Memo
ca501bb6c04f2bff68a0bdf06f514eae99a26212bf4dc9b3c6121ceac96e2862e39769f5eedfec306c9ee211908c311486c0073f90739a7e83bb767a52121b7297e2552118299c42606cf70867fcc6ffc574c6b19f1c996b592bba8cdbd9393bdc63b26bbe76811ad3527c70d896c31cfac9dfd0822be57cd18891f377e7f275 (encrypted)