# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f60fe97c20ae2ca94d34fdcab22e24a25e6f7cfb707895676e755150c2087e2c
Pseudo Output
9610b68b5f39f1e40e17af539dd7d0997b652464fc7cbc4d454dac9410e7b12e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1ed4ce1ee3fab43a6a338f7031e84a4ae9bfcfd946b892aee71aa0be59042c63
Commitment
96ee4b28098f534dea9ea39d469e28efce0cc39adea25d9d27d5c19c067efc3d
Range Proof
672 bytes (Bulletproof)
Memo
5a18cda59e25bbc6a13e8ddedd48d2a9f0c383a924a973abe4402da3b944b334abef1ed40b0f9044e60e2d7b3adf4f5c2dd79f529fc50890e3e5641281f9e91f75c22a67691cc6c03fab51cb827f9ea8062dad948ec013cc89430099965a91df2a45d0e4a2cd99461cb104ec496f6deb363fc5ffbd8194d4ca722e3ea9838d15 (encrypted)
Stealth Address
5405593938245de4503f16fe9dadd335ded4ec83d3747196d3d1a5a9c144e33a
Commitment
e2ece2f9982194b99740c65628f0d0aac3ccbb40ce9a22251608d773f0d68b43
Range Proof
672 bytes (Bulletproof)
Memo
e6a1961de52ef43d58748b51873ec083c221c91e5bc5d899f0533df5ce54bb1d82d49f2e59cc3d34bbd2ff21023abb5f7f87518f52e28b6be1609d3227d5922afa6b7db91a65c58abae449eee6508e8f811cbbd7f12398bdf0f7050551190b2d8dd11609b1e42d96390be155d94d38c3c8d21d65ec2f6ce675f061c02a9e6064 (encrypted)