# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
688291b2b1974059039d460d032767e3500242e88833182a3f096d8c2e33ae6b
Pseudo Output
e432030d3ea553d96039d4f83b2cd8fe4ebc942fd65aa4974ffd4cb392e40238
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a44a9b7b274a8f82781481c3ef5a3d26d691408eea60c744f41a2dfe9c43f331
Commitment
aa439c6decf9919f5f8c7204edb6969f18173e6703fe5abdb4b2795c785bfe69
Range Proof
672 bytes (Bulletproof)
Memo
d66af897ac75e2dea2c9f26d07454b3ec502f29498467aea301364a540db78e62670d1b5b01fdba900930e22bfb3f54c24f64c7527fa151f653cb08d4efe3e6762e8e3a1f3996fb119d1acc5f096bf5b52c53a88bf17140255d81a3cfc38becdb2c6bce21cf5a1e4ca0d2cadedde00603930798a5cc98329912e9f7d944899ac (encrypted)
Stealth Address
0eb55c23b5329983d22e6413fa28eaec0478251e353aac9e387002046cd4192a
Commitment
481646c596dcc1cdb3cde1a272bf17bb669ae107c8b01e63e2405372ad45224f
Range Proof
672 bytes (Bulletproof)
Memo
08e0a635b1610e98d02ac7ba77e7613cb1699e7b30dbd281534609053006a262d0b5a4fb1bb97853a150efd69cf820f409eb6f1b93c5df694761c444237e63cc214439462afba9fafd4ed2bbbb1acc282fb9a6534337aac9897c144b8b39139ec27e28ea9dbc8477835d2ce2c7a76428623cfc44d3e9284fa2202af92a4fcff1 (encrypted)