# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aecafb527b37bd8d6340924cfe1e1d43b23982bee2b3e6a12104cddee9f51d24
Pseudo Output
ace5b0c7fd736b3eb9fb3bec8d6ffe0e33a0966dc275166997627d1fb276b81f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
741e38dc81a01d8ef4cb94410e91b2978ee658bb1822b4f7d1931007aa58dd48
Commitment
522aeda7b02839e7fe62d04c4d47c1cb2db69d641b31d9ca3ebc31d7553e7045
Range Proof
672 bytes (Bulletproof)
Memo
881e5aaed1c7f9502b76d7467c9d04cda2f7c0b77f28438d5660e351e97e4721cc3328deb719a284645e9b918257f4dbe91facdf5de91d9d19d2f2e2ddacb4ae9d7f11ced970a864f0c69ce829394f17b711b4ec58663060842206d3d6e9e83038a8076615610841d42fd58263dd67f9b5c0d6a0d6927ff463d402c43846a5f6 (encrypted)
Stealth Address
10552b5d2f894ad5b16f5248ed859a4b748c7fed8643e5d95a3761766e25fb61
Commitment
28496d0ce5d01246fd10153a9a13d9466062de7f26050db7d21848dbbd30c116
Range Proof
672 bytes (Bulletproof)
Memo
3591c238b0d625ab7453079bf64e1a5b9ac4a3844c24fe78bd535cc134e930dbb6882dcdc9239fe327c7c190c92e64497c86d5c3577140c1137c13615aea35f7bbf62395907c93d6fca13bdd583f182bb27aab65b6541194e9ef0b82e28b5a3195f1c674e2ccc913145d7169647759f311e815b878d9a383a397e5c16cc1d380 (encrypted)