# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aa6509033099ad9dd48ba6532f1a8e624d79fde2b9ddab403e9d3b0ab399407a
Pseudo Output
e8e8c1acf8e5042a072272dc085e84b9e8053dfdbaa797c6f78bb0f2d6d0315b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f499cb055be498b7c250896acc41af5c9ce7858dae1604961eaa1d23e8293f01
Commitment
60dbff808b111d5d4f345ea82bae654d41ac021579961196f56e2054ade82c11
Range Proof
672 bytes (Bulletproof)
Memo
013352cc8577a45d798b72e064eb989179ed35a4dd779cbb92dfc6d0bf470601b98eaa781c7c44ec4ac68da74ad262531d1d23a9ea5f4100bc4bbc9688db596ef0e83db138e2916af0e49df8170b35be9b4fc4a4eadb53f051c6aec62e3fe722b25cc2a60ebdbe9224b891600c13a0f9d09e05e4db4f9f10ee636d1545751218 (encrypted)
Stealth Address
08da7384bc170138a1060eaf919bbbef6ce18064c48705e0221f1bca22008244
Commitment
6406f44e8fd26de7b192c39417cc672dac7b088ef021c24c5986c2ad4e9e417c
Range Proof
672 bytes (Bulletproof)
Memo
9d802c5c608f1a5a5e989640b3b48d66564828444c42d118c9091ae3ceba661d8047644c8b5b9588b5898fedbc65d84d7ede2fc83e4a0a3925f947b760a446ad492632081ba55c3ce59a7f2480b1aa635ef5ef862b48e7458ec3a72c56d4c2d4e62d33c59f989b239d7a9a9afe283940cb953a58a68b484303a17e7306c14ddb (encrypted)