# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d42456a379899c266bce19298ad7876c61c91845748c656a76538de3ac58d51e
Pseudo Output
941b7e9b791de160b8c5c11713df6fc9899acd07ef360f5e8c8e68bcca2ec37f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
641b836f2dcc0aba9eafd86cb229bcb8476dc05429b9c4ce9e025593e97cb73e
Commitment
ea71e66fba92632109060c71c19b8011292e16160e142cf12e1f83a60508f12b
Range Proof
672 bytes (Bulletproof)
Memo
d534da9a6f1b099baf0de0c8aed53d6c4ab25900579e1611e3eba257a8d27cb5032b653f38bfce5217729f72d0a32d357bc6097579345325e511b9721dae11e5ab8481f2823a3ecf92c773f8498456eb7dc7c4fbd7b07559dc8412a39c44f72317bd03402ce51c4269b6579faa87ba25f7707e93c19d5de6654df852ae5296af (encrypted)
Stealth Address
1c00a0b499d509bb3399ff3931f7188bd3f297e3cd41f8aac53f59201fe53267
Commitment
84155d2c624ab4dc3af9110fd9be50257919c63123aa332be9b22769401fda3c
Range Proof
672 bytes (Bulletproof)
Memo
084d490de06aa41052f5351c348fad75a8d610a302cbb508b90c1ba341708b70795cab87a69288e886ba98d4624e6b4dce2fc9772176812c9fffcb8885a60368660a8d1a5280497b69b8778f232432b15332c363e3f5865b71c94ad6d22ef1612883d7b28da2307d5433164e4973938257d41e660f80c44513facb3dfae2a955 (encrypted)