# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9ac6630e99ef8fff1b59e64289acb25a340153f805f030d3b1d32440da956e03
Pseudo Output
1a6b3c066b274227953d9d6f48f69ec2727c00ccf1e6a7fa9150fa508f39172b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4c4929f0d18a1e425943eed53e13fc173a422480e056d509836ecec10171825e
Commitment
1c5c994df18d4ab5a69d20fbbe4220c158c3e6a0955c469c7073bb5d1602921c
Range Proof
672 bytes (Bulletproof)
Memo
e91c56745dc90c0333d0a7985bad764a78ea3e76bad0b240a1b09447afb23b456187ce1e52f2af39ac2514ae544f8b007976107641df181fb211eeb0273453d8ecbcb647b4c1e93c0ab222aaaec09e4d32d9d797440ef7612c5eaf2af6453404c6918ca2c734a02c07335a9e272bf4c8524eb59363d72fbac40145c4b5b2eaef (encrypted)
Stealth Address
425408d2d40c3f9da3f33a667cb192d16dee132b8ecc56695633a98916891f7b
Commitment
38f3787f5bb4c2c2a574fceb293deff1cfb3e1dbf5526cdad55d055403125a75
Range Proof
672 bytes (Bulletproof)
Memo
293c0b1d6e680c54db69e4ffa1bd55c363caacff5daa2efbc92104c9b31e45e0acba3b6eadefc082f83ae1ac9d99523b4f2aaafd04ef3f24bc1cfc94b0ac3c9758da70a85eca3549ea7809be1db18f225e5341a2a16aae248877a2fbcdf67c3edc0e6d8fe1e05705a9d6729bc724abdd2cc8b11e33997d6824b13fdbd5e10bf9 (encrypted)