# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8c6a6edede37f7c7c47854560b64ec65bc277608b3e127c064d5f3973211a375
Pseudo Output
f267496cbb89e82c9345bdb650d32a17804f5f0240e1299bff8881aa30ce0110
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9aaa2169a6c2a2cb5e1c8ef93b25607e75e288ede6fda62e0612e155508c8157
Commitment
fc2cbc9f971eba63c3e13a80ffbbbca702c211b3c415605ea10cbe813a31870f
Range Proof
672 bytes (Bulletproof)
Memo
a84f1a46fd81b634e25af9c01470dfee3ea971cc3c395bacf9ae415487cdd2a99904e7d3d5c9be98b1587590a264bddf5cd7e09425f62642f1c3c9e7564103fddea4a034a6270768566779601d294195b6c10eea343799fc91f93d624d27c5673b9df2ef0e36df4eb44ccaa9800b7d1f38a1a640e1d6be1c4b0836f525f71ef6 (encrypted)
Stealth Address
4681fef9bd579eb57801916f79c097172104edf4bfde8e45568340e8e150a569
Commitment
6a3bec6e6a16021375458ad309f4ae8bc1ceab3361e43c0305a49de1f601052b
Range Proof
672 bytes (Bulletproof)
Memo
d7c5f7ab6d7844dea8b854c890f7d23d30124424938dfefd746e2b33e7db91a6b60e1ddc1fa525fa6c48e9865a54bcdcc09c0781f017a76053b87d35537a5dd9fe2238f33d9e776c099a4415d544e18b500da7d617ac4db6b5e4f26a8c986a27b559564a1f9b0a23a247362a1347fa208c8a24014aac2840e30b8bee0868f75b (encrypted)