# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b0d2c1e76105fd6a7b5f6deb0d9a32adb66c6f9db1981e8b7102ed4ed2fbdb51
Pseudo Output
00ccb58ad46112ae3a891ed31046391872979b53f04310ff7d432feb32e7a81c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
566a9d169d463748c9330bf28b1dd90e6f34916517bc86f504673796daff003c
Commitment
d2c8b558f4236d9db4b8451bef18e09dc230f24d03da5cea470eaf3d58682e6c
Range Proof
672 bytes (Bulletproof)
Memo
e031c21f8dcc2089555edf659d83721f0f706fb88e3245bec8c3eeafb59904b79961ca9a2ec08d51ddae0d5157cf1d7458814433aecddf149e5d0942a254facf639078cc64c73ada21f6de9cacd87c3cdc571b7662965de40d3cdd464b217de7ab3305e0e0a384a034f235e0bfd14e3acdc1fd5cb6f18bd6a887b816a5725a18 (encrypted)
Stealth Address
b60be1585f61db93a28638b6c8b52a0a5287c1db74f352ef4a892870e48b4c7a
Commitment
ce2ab0732980de18f9b490d134944dec4bc940538eb2333c12bff2d7187fb25a
Range Proof
672 bytes (Bulletproof)
Memo
984b8466268f7649397749e0cd2d1e28e6ea70f2b53d4204a54ba2b3b97392ec9e3f4bfffa3cef71fbbceab5077b9f2490f52665b1b2bbe596b9bb26bd58b309d4b74852318497fd7c4886c8be2759c2df88bdfda3f62f31895645369719f21bed111f9c70592b8105e57aed298634d27db2ae154ad512709471998db19a3284 (encrypted)