# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
12a2a87bfc766f056bab3bab35d05a1aba05d8fbac72629fdbf3613107205c18
Pseudo Output
fc7f92d1a2c692a1d606de06c97ecf1e944a08e5d2113fe013d29b7ee1738b37
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4a00264b9e9d6aa83072b64dfd1761accdb80869ec5cd7b7ff07ff099bccd412
Commitment
741709fa8ab4116c922dbccee3540a3542a00e29aafc58d74a2f6bf25c013315
Range Proof
672 bytes (Bulletproof)
Memo
0c813166f1728c16f20e8efa0dbacb664ac1c77f4fec83468f1bd5ec76d5797a895482e692e983d5926b74d32cd8a832c0dedff9ee149d63c89a99e963e00a0fbdccc9c23418f1a071948a2a46e2e7aae61da7efe2369143197580b1c1b0a7eceba141b514a5a8bad2a4330fb2924412f4bd0e8edd43ad2d4d0a91de8ba5be44 (encrypted)
Stealth Address
668d93d6b3578ef3c3074fcef5edddab921c016dafb66ebb46362517b693aa58
Commitment
165ce16db73010486708157a41b029d7518c22f36a282a357f012dba8affc41a
Range Proof
672 bytes (Bulletproof)
Memo
7900aec54a9712636d1969e08aabd24727a500f4496bcf2ccd3e183791f55244a2a7fec956b04553e8e1fec9a7296e0a7e3110acd240a3173a87cf5c6d1c72d6111fd63abfe90df1ec73762983dfe6e246b7c69de13e40280b8c305371136093e48e35d5d6a7f3ba0efaad80a1f218abd3e4fb0764353b087be96dea74a02999 (encrypted)