# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ca49e11bad3ac3ba1e4a2a07ce27556407f831379973cc6b8a7560b0caba965c
Pseudo Output
463ee8a78ae00b84b274b045959c17bb8ccd3c63facd173a988c5d0cd28a7712
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c451bb68292e3978dc315dfc0eaa69714aac1157ef51802e990cffccae8ae91e
Commitment
2020fe5ddf11f7929c149b0d7cfa836caa12f1676a2443d5d86ca2b4b8973115
Range Proof
672 bytes (Bulletproof)
Memo
7b8f6d00b41b0764895806ae5dfa32a5b8ecaa945829a2691115673d63592eb62ed493886737cb863b7fe25480fa14010d90ad90c28ff3aa999ec50a8b7a1851881b003ffeb3f80df632974807234ea796f37d006f98df623863564d4263ce087664a14f01ce7336eed9eb517ac88604dc9fb1df4f7f62a35a367cc50af00654 (encrypted)
Stealth Address
1cd9054aa4b858670531f0e31c7a96b79d534e389bb5a1f2cac2f0e58e710007
Commitment
722f0a86b35758751dc7a0cdd17a18e868b8156aad99883798b16acd00ceab66
Range Proof
672 bytes (Bulletproof)
Memo
9baa0f896fe33d1306fca1cba3cd45094c75aeed4d62b19c04722ae15d717162bf0bb1afa109872d48d8d5e177b06236ab67e022685434e280bf267bddfc42b9fcbca7fcbb80db5f0480304b6c811cb7ef6516eefa6366fd269402e19e5dd6db10ed3a8c89bf1ecae3681fbff6cd1166d375deebf1c100ab938a37453987f058 (encrypted)