# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
506db8f4a7abe19cd7aaf69a8c72541fba1949738036e4660d8d855fc8f6b955
Pseudo Output
4a14670b299815a552a2596d95e1e24366e7ec8954ff79db4929d02a3dbf0468
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9e60e74f16eb8b93668e7ea0db7f30ef1be8556b5783100a525c78e0b2b25d08
Commitment
40aabe750fe2af59192fd6a8cd3e2df34abade3582ed77b6d6f2403ec866201b
Range Proof
672 bytes (Bulletproof)
Memo
73128d52d07082cf0c2f6fca7cd41ad5bd2210d3f1a3d400ed12da576b941189bc66f54e77aa38b1fd6ffb78cbad9025b54368af4d6f88b20e88aa85fb5cb7c81de2f6412040a73986c456f3f1a31d4c26a449c553af83001035566097f70295b012a10b4b53aca5193a39d506db6b78aa3b1d93b3cc19cb5732967d00316f43 (encrypted)
Stealth Address
6ce08788c15c2cc1de57b191609a983a52d06e0ed5cf3fb6ece308c5c571a564
Commitment
e6a9b3ad18b0f525746db2c8f3d84fef2c5faccbd4c141b08ca944005955ff61
Range Proof
672 bytes (Bulletproof)
Memo
92d3ed86e0e700f523b83fa726cba667f03343aeb2eb7f12e8a47ca24efabf3ccdcebd67e726e28e7caa824141e8deb8ad51d8956d1a81d5c7429848aee857623b7294b974c9c2c1811e9b5485100ac94802e541b7e54f04534fc6b4658f721712bd981796f9160d082e757da9fe574eb8ffe710c3b74f0f267ffffd97d95744 (encrypted)