# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7e6cd34530e189abb432b5bb7e6d5771f9f96c8f9afdbb5020e94716f4ef9d43
Pseudo Output
50a74b268b4e195fed9aed899d2cd1274bac364336a7a0ef756593fdbc53ef1f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
405d37e055eece6a6a15d3fca120cf100af7b78e92f7c378b9a6803579ad2f56
Commitment
cebdc7b031c8e4fb6e768bf2348e3b25a445a06a0dfb8a26e407ec29d493ec00
Range Proof
672 bytes (Bulletproof)
Memo
ee5c502cde33e5fbaaed8b6df20a4f69c99fe8eeafb2d921742788371623ba5ff89d7f5916eb89bd924bf49986b5d06b6b53f366996c0a14708d4ff9f920ee7f4020e6bb84e0ac834c20d23abe57938066fa8294d6af8d63b199562e79d70ae26969a547b8b523e310393bd9b59b7a846325437aeaa859af587f1f22898b3cc6 (encrypted)
Stealth Address
486967d9f9ac56951548e0bf4561a98779905d75a946922b949b080db16ffd0b
Commitment
6499b4ace2c9ab2a3139eb603546ecd5aeed184946592fb5fa6defdb8b0ec17c
Range Proof
672 bytes (Bulletproof)
Memo
8274cb890fd1fadbf440fc0c13d2932d8981296492415389bddcd9910c1190650771eef4397481222b95cef6897a76a4ef593e7a77cffdbf3b54b843a58c8f63ff80695d5a1fbac1699fff4e85a0fd877c129b0d4b523eda2ca476e7fd4568333237cc34550ce35eec340067ce31de04540fc352cfc89166f14350c413649c51 (encrypted)