# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c254f751470bf3371d72380727d8a72023d90e02b70ef93874403ae8ef0cc915
Pseudo Output
3c1f1390cb955ce8278b7d6c1df6eebc6e12bd3c8366b6259f6e17699a4c4818
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6ae02fa8d3c2e4c75fe213f54fe8b58ad0f9de0cf960283c48659fce19dc3257
Commitment
decb4f3ccc212835881febd56877fab42cdbd22b32c137e4fd4663d94150b407
Range Proof
672 bytes (Bulletproof)
Memo
1e0b5e6ae21f5b5f2f450cb7795b03a81d44bedba732c8a5a738a2f601814f0fd61cc4a71015295257bdd78a12e9a528f8e53747746301777a347c68cabe9797d281f9740e57669a109e7d1ae92fe6857f85e08a5cfb385413396420bb03fb47d2f9aa922ea30c46e535771034f353390ccd487f22ac25afb07424cbf76337f9 (encrypted)
Stealth Address
92db8cb4cffb49140118d3d6e487dd02322f0b75fcd0c89e2380cc1064a37c5e
Commitment
4c3c3a5d468475387c2fe3267823fafdba7326f635da8ad2248021d9922b9415
Range Proof
672 bytes (Bulletproof)
Memo
06ef5486dcd0f8081bcbdc885f3fe0078f2b0e2e1ca258d1deb032b0681c4d263ae0e2eb02a40968c023596ce70edc9696a44ff14b1f8167fb0134cbd27b13b56b31c29a779bc8cd19b95431d61fdaf75e0a37013552969f87f172f00cc9b8f50a84d7b6f60d29673f6e287842a65a277d582146f592552b93cea6b19d240917 (encrypted)