# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
eeef52392b2db2236cabdda744abb60a6a2d95abf33d4d3d708e1f2aa43ccd74
Pseudo Output
743c215e3cb0c3e0bb9899fc21c276085e0de417df6fef84ac6188f1d22f876d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b40a86ed75b49c8575e7e4ed235ccf83a71f0fc8d6c7fd68c599cbf266117118
Commitment
7ac116d07851b25c65198c5dc44ed12ba2656e5c0a44bc0b3e07c5814f050a07
Range Proof
672 bytes (Bulletproof)
Memo
c75c41055e9b45e69d016261d868ea566dbc011e77595663fd8e594f7ba64fa3a93e9dac07fd048aac26efeb6456e2610787494cdb85e21543eeacd521921a4dc10dcb1edbf839fd4a1935fb42123c660a474a6ee84fbcf7974853aff33780f28e83392b6734a623178c6e6d8422b5e203c751702b58b326045d2c825b2c183b (encrypted)
Stealth Address
a0ba5afee0cc83d308226dd9cbe7e10e738a4468844017b39928f119e443a92e
Commitment
bc9fa95686e68a59ee0ce128e6bb23e77c80bea5421efaae6df67fc6d4365665
Range Proof
672 bytes (Bulletproof)
Memo
05f6fd6c3c202ca54caf9b93213f1a1c1f56359a2c96490eb77536bfbda9446ca8c7a429fcd5e9b64d242cd133257bac1c7c8697134d29009a19b1944a8035fdd75db8b63bab16054b3187175c09446150cdb3795bad486f4bcda150e32016106213143f8d7f271a770853efd273a288fc3d559cc7c3dd553b774d7b1fe13969 (encrypted)