# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aa7b00ba078014fd866a19ca9efff1dcd206ac446a035afb43872278d7e3716b
Pseudo Output
ce48beea0f27db42b50141d5aac37e18fed8638140395ea4ad770adb02e4073f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
14998c0977edc6546226c8665f3758160e4473d862863ec4f9ce048ae9cfb746
Commitment
92bbd1f9117e5f5bc78c1b547e07a0e474bd7b858565b7f65d9f66fa7f156532
Range Proof
672 bytes (Bulletproof)
Memo
9cd3d989706b9ef4a6429c9947e8badf6dc641dc4b009ddf9c94abc57d5adaaec8a50d3b9e866c66ca2ac6156b470c02800bd8c3f68ad6cd42cc4fccdde742c14aefb89584be10fc81f26b3a2fea7a69fb441a60cc18d25d464a89f297fdf2d3bdf290a55dd99d5fdd7f848605066e0c4f955bfc3bdccdab9303faaff0a58853 (encrypted)
Stealth Address
746651da73aac85d489edd590d68165c1f81d71cfdc8f757af65242aa289d806
Commitment
2420fbd0a9ca6c6913e62fa06ee745dade9c3ef9b1cce2953c1817881412d360
Range Proof
672 bytes (Bulletproof)
Memo
5043b0f0aefa2bb63c8b47e2da85ac5d3afd823bceed58c474ad7fb4e42d3e2b14b767b3d654385b8151294b553338b93c11edb6eb24204d5a403d1b727d4d109d3c6ae14a74c429dca65db76232e36cb8a3bd4a5af09d534b6ad5a7266d8c771363c2f2d5c0fc9acbed115a6b7fb1309b1163b1feb23716bb2a9b46eebbca36 (encrypted)