# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
70c324d6060dd0898ff5426607c4e509bac9f7216e3571b32cedb9c17915e06a
Pseudo Output
9e16a7c9e71ce076056f3285a3ab7a16d60f54f07929ded856538611ca08d90a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c83e0f5d493e41156aa7893e46ed74e742ffa7f2fd86acdfb5fb2e3364569b43
Commitment
38565b327aabcd83ca301ddcf686e4e57cc59591fdaea74babb672ae9d92d672
Range Proof
672 bytes (Bulletproof)
Memo
a97c277fc90a63fbf313437f92df3b4d4cf59725079cf35241f4b676704d27fc11a5da28a101d65d89429281be8eca6dda86e309445fbb6e598eec769421d8b166dea858184e448cc486f80e970b48bbda99b9538f4261797c2162f7e37d6a569e7fb6d5eb5a75d962b6672eba0a9afcf550c9ab2d3d05f64b6d344616d65dd2 (encrypted)
Stealth Address
56d602da8290c4c0a419d6dd37646fce634e70295583fa8efc2bfdeb51625f31
Commitment
3e34b75a72f6405bf3fc46b1f16e38800dedd960ececff27a8c842834038454d
Range Proof
672 bytes (Bulletproof)
Memo
2dc54acdb38b58fe21486988d5eedce25d231e1fbc9120e5b2aac7da1ab9ea0913b69bfb12b6172b3a2efed0ea81323ca87010ffa0919bd0df9847ae5fde97c7430a20264a2044f9c2de7d6b09daadd11f2582cbb482adf491fd290a2242ed996919bb27d0a41e20403f2558957b3453d4c7b650b918d0ff13fe188ddafabe44 (encrypted)