# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
009d75bb784a201324a55da37a87ae1c8dcf7404323895cc59eeccc128f7d01b
Pseudo Output
88ace5700b3c2b75b107ce672b2533a94ce91a833fae647fd6911b77b6584b27
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b04c55472d8cea1211ba7c1d30d99684fb4704ec94f2e2a28ff7bbf16d265d5e
Commitment
646584d306ff2c7b5203c7664f032e0567c9fc8311a1b23ceece725b250bee75
Range Proof
672 bytes (Bulletproof)
Memo
0c30b95b67b564b29ce60dbcba7e4b496348b857ce9be5abda4f53b4c89fdc4d12179342215cb788d8b207d5930a455fed4f0dc680ecda0b6535520aed1f8d9a417504c2caee88a4073464b3b81e5c5b850a06a0c37bb6dd05154f6a49c7172bd7ad56c5aa06ab1e69f40c832aa2eedbaa1a464a1e29d1920d7e70faf46dedb8 (encrypted)
Stealth Address
647d322873a0b7763cffe4ec762fc946ae875ce0ad67a0e724e18958c793b428
Commitment
aa64cf464caf0ff48e2e65bd9abebd2e2c9927a46c1a194d318d70993af6bd0d
Range Proof
672 bytes (Bulletproof)
Memo
2b5aaa0efca0ca3b249eb07a71a33c420156dde878296e513baba15bfcda95ab8c5ec8e1f94f456f1d414f251d76b6e8555b6768f9f287f33d6f8da3d755d49d7f0e3f356c156dba83f2aabbbe9ca7a0bacd5dce7e78fa803c5f9d6132e7aa569873b928e58e9ca94d77112948de782714c5ecb8ffb59d1f0ad077bd51f24cf4 (encrypted)