# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ac0935ce513880941f3fa0bf739e17f671da54ab4c272d24d18514e328b5806d
Pseudo Output
f02ab9988b4bddb4f21fc7686bf27a2557a3b3226d062b6fd7a3a79ed6274654
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ae06a52895b112cb1f7d8a131a60cdb2528e712bfd2717a965667f84382ab419
Commitment
52d185449c8c9ae0366117712ed6bf58518540be237801de119ad04d2e2cfa63
Range Proof
672 bytes (Bulletproof)
Memo
9d8d212a263dcaf251b745bfc4387ddeb3de568d203d331372fb385d0d5062597f32ecef51de34abde14df636dd9034f5502dcdc30f68f39bb95a6469e6e1af2cf93c4d4ff0a6034ccdd46f28dfa77a5f9d9491e196bd486d7804d82507f15df5bcaae70ab3fe7db5dd1e7272b546dbe7ff5707eaec2210e7dd4efcce221dc9a (encrypted)
Stealth Address
14b23c560330a62827ef982c0839a7a800ce7eefc7da181ff4032ab103da0b18
Commitment
6cd4b9668edf5294f901d30728c769656a2f05501477eb05c8104c3e7df6d658
Range Proof
672 bytes (Bulletproof)
Memo
3c8b0a5dec22c1c87b3a018b86a162bea315956cf3480eece8443d308530350506da1bec0fc3c8a068dc5d5d0e40c6c1c902123e9ec7733e65e0de7e6562a2835ad53b5cbdbdea253b788a80ca338206539667811a2323dfbbee8af8ad82f683ff91adbae76ba6ade534a37ee428b60e6ccb97e0bec9ddbc565ef87c6316840f (encrypted)