# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0aa3dce86f34ed71ab98a166279dd14594de665443a7af8a5584399d60066a64
Pseudo Output
0c768141e98f6bd4cb06a9cf5ec3e8ecf191294c597be17af491983f9d224823
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a8848c972ccc0c3f22a29ee2b9c7ff401c37cd01b969ed5cd7bf0fd690343737
Commitment
5adeb8b4d9e04ac6bdbbbe80391ffe35857f04d0080c8b30e3d25e79e53d9a53
Range Proof
672 bytes (Bulletproof)
Memo
558d57f645c5d8bb093d45d6bc227f683937d8cab6b2a3b13424ada4ea386e1a18c03659ab58ac9cbff45e3b17a2626ee415f22d86af1f5137e610fdea58ce64c5af4ef04b7b82f151d373d162f4f25ee69ce7b359a96bb323af5cb8655762d4f6342bb8dc0c9ab0397a99eaf570035c246a02be12cdec48d22a680ad6a141ca (encrypted)
Stealth Address
4c2bb63d2410308e70819c98bd892c0a9cc46c8a2e5b8c3de91e2f8af6636153
Commitment
4634e099bcab77b839c399dc518cf56fb56c1dda6fd2985738c9d890a604185a
Range Proof
672 bytes (Bulletproof)
Memo
0d953cf71b43bee3b93cc700742766d98027c8b8bde6643daa2471ce8ba9dd23b58eb9e326fcc2826c75d65916bdccea6b420bb6682798383a68b56864b57262e00d3529f0cec320167d3f2771706cafcbf09b431bfe00162ad0e645eca2d2979988d36cb812fe20ff70240015c65b5db1ce6c5217ebe37fd5a7145f762168ee (encrypted)