# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c41bf5bc1bc7678b4e7442ea5b976e6afef1d861ce4ee18f20efa0a74bdcd416
Pseudo Output
6cdf18897cf2011c5a442c25a69d7ac27cce45a0704995e59c1c6fe169cf711e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a0bfc5da6281d3aab960a55ed6cb5a132b0cd065a3c57c70cc5db6e2b01c0631
Commitment
6007028900dc6798f4882dee6de77deb8d41b506e589d5e2de08ad8135340d6b
Range Proof
672 bytes (Bulletproof)
Memo
2ea60b74438369d6a5bd7d1e3cff258821d8af11fda6850c3b3c57f05c344722cf8e56a8a9d92e7c67643ccd72cd4176538b60a846c6cc556c8b3fbbd90ff3dc4f4c52f35dd0d859b738720bc10d26a7c7141e8514f27e1b3920f9389e13d381743b82dd6b617c60cde41a720f1ed3c939a7a4ee35b92f9d27a9d40d5ff5ae88 (encrypted)
Stealth Address
3c09360c686d454f23998fffe6d7269c51cd3e04a11fd9a7b7cb822544a2dd6e
Commitment
14991416bbe4cb97382d027a71a57c8f627146e791efd6e61933196b807bfe28
Range Proof
672 bytes (Bulletproof)
Memo
9edffdb6f0f777f5964aaa50b6eb61561849499b43ce992df4de6f3059e359cd3f9c999bdc8e3df56af698ddd98caa469ef7e598003f2478a39dd8b69af2aba473bd1cfbd022f3eb9c6f888c154cd55067cba11236414e3438d3b2b25e09f8c29a3e127edf6321089f344b6f17c5500e014c2de847a72049c3e8484936ba5897 (encrypted)