# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9850f4cd2209f5ddbf8f9e85f0562228f3c2b3e3350232f22447cfe6fff7f702
Pseudo Output
d26b70f297cf82a1d6117fc31eb3e75adeee038e8ee259549dd8c6be7eb7020b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
524481a87a8d8e2a646eb1bcb9cc736d735a85f3dd88e1d6a5048229f69a2275
Commitment
e6539604e640e757b9831c3fb2ec0b3e2ee393b921dca59ff17f5b3c4b87130d
Range Proof
672 bytes (Bulletproof)
Memo
ac7aa094fe02dcc256b111d39cd10ec68eab81506be42291cc91ce332d425138f60bf56462df02af2542b03b65b60f568f115657c6e90a53e2800df24a3e4dcd6fafef3005803086d1d88ffbd2a404fdafb1441bb82ca7105f2edca181f7ac1e3202b758a003f59b586949a5891cce8b9f69fcfcdd0f21618024961b6b35087c (encrypted)
Stealth Address
08107912aca22f81691df14d173b9dbb9e5b5343d3ad574803e6edad8c520c67
Commitment
4262e31e488b6c5bfc98b76b76949d757eff445c69ad4daff712a30bcfa84c28
Range Proof
672 bytes (Bulletproof)
Memo
6249a715f8e8465946b89c34154cfee1ca4be3f2c2fdd19dcd8a9350a2f9b5e056006704b44eab21018ef2faedfa45651b7ad802cc0e5de2780fbf11299a35eb646e2ed886b4a7ac158239ca9ae338699c4653050672d6414a97c806b53e31f594aa19129b3213aed717794572bbb6a0e15181f8dca01c14e243d0fe3f4d4bfb (encrypted)