# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4c6b7492e58c38236111a025752d5cab81b15ff0a22c83e064c79bb628e77469
Pseudo Output
6c9e7934f4d61505ffc6e1e4e9e58d3daa22d6edafda1b0a8ac0ae6120106040
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5c0030c8ac692b1c7a97f52087adfcb1f8d386c78481e23938bedff3520d8656
Commitment
90df9ac0f4327838467f7aff13ee960e9a95c1fc84c6baea9fce9580a25b721c
Range Proof
672 bytes (Bulletproof)
Memo
462ab6b91455a1aab5232b2b7234b44991f6feb9e9fc4b783a3453366a7ab86ddaa8c9c63b94fb22d7af30989dd4e6281a57bd937d23d3406c26b8767dcec0c1da2ef93e980d79bccb5d7dc783126be8dc6091c6ded138b5300f227c366e5658338b12fa85a2dc1a1e671ae1ce45fadec5aeae3d65a29a7405f13062dfdb2afe (encrypted)
Stealth Address
aa0cfb1e9655ba289b41238b2b0637af8daa298a28fcc46bdaa50b8dcec02110
Commitment
5248a8dcf26fd09d5a41d4071839ab571738a6c87977498db9cd9267ab37e66d
Range Proof
672 bytes (Bulletproof)
Memo
f7db269ef3934ef2a9b1e68cc6ffd378198134737dca19b374f7a909a2c480865569ef3fe1195c8d6cfb62d8de234bd329f9e1566051582838bf3963d8749d17f650169bf9303ebbbd1036f0e3bae484a52756d1e720fcaadfcb71b4bda4b0af6dc7ad811a5328ef535be724165df28ed879039d2de9eaf458c94fdbaa4da1cf (encrypted)