# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
40c903c95fa19efadc580899693e9830d7c717a35ef44cf01acc56a01aea6f59
Pseudo Output
cac8c8d3a91208abfc761aaf2959bafe2496488e012f73c35384945dfde8e677
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6c0d3d8d83546813ef938def5fd83dff276b52fded51262a9ab24b71406d9d69
Commitment
a0dd2812de76a1b9ba5f547048aee49f5da9576232c08bba41d6b0d8911dbe75
Range Proof
672 bytes (Bulletproof)
Memo
7b53f34f4d855e223e0033ecf211ee064a7de86f131736176c8e031cd6482c433d0ed930d23d73d808a7a791546addb2a0808160bb35217f63a4e629250c2e712ed75e47c083618a5e10f34d7a75bf66f0be0ea6b920574525cdfbdbe2e6e5584453fcce91fc961c43e360863f087a0f8a9bdd9b9e938d06fe39d075fa475869 (encrypted)
Stealth Address
04fdf96167fa07138caf8f0dde631aa5acb2befcdea66d61e6c370502a033c6f
Commitment
9e89ff29b87e31fdb26e8a312b149fa41cc5a5b83a15e454a3a42f9a3978f44d
Range Proof
672 bytes (Bulletproof)
Memo
1cfc4c799bec829ed534fa6e323ecc7e234e606fc182eb6db47b00d6ad33d1fc9c57271884dc34cf23468c93769af8d3719978453d74df9a2b58c75aea6a8d3426f1fe24f307cdc210e810ecddd0117b467e09517059e31fb6459971a8fb99c38005b9f441296ed0c8fe88845b69d947c9bd2000320877e239c6311a429c57d8 (encrypted)