# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1a80e99b2c7b6a0731aeaf29b618012b9a3f2f49a1d712d21514580b4bc4f01e
Pseudo Output
acd079654a7229d11e9b67d748cf5b1746621af886d47f64ba731c53670dd134
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c215ed96b0dba54d1ff09953cea37095998ea8758262c09c55cf63c090ac7118
Commitment
0af2a8cf26acf1f219bf7c912a0f98b1c85a536c3df73c4cdf4d6d6880089c25
Range Proof
672 bytes (Bulletproof)
Memo
eeb9e2150130b96e10cb698ffac824c3f85270d136d70421f4956b2f2842d3cf1d4ec438c34215b276e7354a2d832ba33ccd7ea70cb1d1fd6e1c23f566ef87a40f16ffb8e853890fcd8f3a6f2287c5844775500acdeb9c4d476a21377017103513f3eebff2f68ea6c26b49b0f391d71ca73a7691bebe13e4f3146eaf92c154d3 (encrypted)
Stealth Address
4ad96fc50b73385a93a3d013a6de27424dc4b9509d8a661aadb2028622542450
Commitment
681b5a6ac52b608636d05243bb328dea8df28d1a5bf04ce2254bf0424d2ef819
Range Proof
672 bytes (Bulletproof)
Memo
0abc67377288ca2a1f162e2da252eb6ea0929151250568db75b3049dbab48ca03b3fbf4e907b208e31f5786d665667fa57be5cc1a818e1cb83bfa3bebcab58d7493c1bc97ac98d5f7d0e317fbc7002aeb160cc5be610f52f7b0e67f01b624909386adbdb20bc24ad0726834128ae908e9b0df90bc05bc2bfe06b46e257b88c57 (encrypted)