# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7e550aaddfe91dd529de0c42e45fca96c0a8ea8051fb8f5611a5abdbc66c0d30
Pseudo Output
9011fa22a9a2621d4386240ec87175adaec54963c826fa8aa35df0b2ac29d20e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f0440b7f6e0d090e3e324f7a48af8cfe89a0b916ff6adde1d6f30f7a4ccdf671
Commitment
d6a3f20458b3f669abca3c0b720cb9c536a85d8e691dd9c1bb09048aeb493423
Range Proof
672 bytes (Bulletproof)
Memo
3d158308ea4a024374ce7bca52717da7ad188509ca87f0d4601a9d9bb64e74b32987ee548e9eeb0fa1250851c94059a99a28e4176b4aaad71ad99eb405d52bed1245d8039fceac433b6169918fac8c82a7b0494dabc82e00582ff9a53c581040a201519a011db092e5dcb4c7ffd2b58327cd309b366e0aca2b4a9c2b847e4e18 (encrypted)
Stealth Address
6499c5c50d131a26d1f7b3558dba9af90b8e91efa03f06515473e83e6185a239
Commitment
022ca2790505407743cef9ffc2dde5b04f6a40ae36fc01fcdafefa1bc915bf55
Range Proof
672 bytes (Bulletproof)
Memo
c3b991ce72a0e33c0eed88a2b0c0fe3ce11eb4b4dd22449155c9b81abdbef0b49acaaa3537ab289a0daa537040de6d573699477f593b65ab91eb26b7dd063d9a3697c3557d4c2e2229f209c3164254341fe6ee255aef7d6654aeff7a80c06f570f823820537f6726267625bd095dfbe7106de0cf683d051e5ff8d063050538b3 (encrypted)