# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
083bc33e0c58efb09b407411730f9c58e251168329027a6e470a9e6b2233c93e
Pseudo Output
1c32f65c3142ae7364c0ce8e21e94f556b331058abc5c57dd9ac66a2fc13a11a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6edad26a300ca2f5d47bcbaf0309e63dd633aa2f238f371d169bb0c53678d055
Commitment
fe09776cb7eab876b72e832f0f4336f6de7e7e917cfe8b5f2a1c750abea27e4b
Range Proof
672 bytes (Bulletproof)
Memo
e698eb90058da34ae7280c0b730ce824bfc2a2e64f59557916020824970b0d39202706ca53eb044521e4d4c8e2daa9bf8637300566294f3497b4305084aeba0ea4bb17c5ef3a33b0dfd94d971c4108c0d99f1f63bbb8310d235458742056f03167fa2d574eb89d8aeae9394ba82c0a14e8a5db6e1f3ba077633ba6aaf573474f (encrypted)
Stealth Address
e05ec8a82acbb50105f7542608e7403edef75e0cafa04fcf10bca0c7d2db3b78
Commitment
9c87fc8c21e521373fcbb2c2397093218e0e530ce3357f1500c5951273b0177f
Range Proof
672 bytes (Bulletproof)
Memo
e9a9eff76c13c2ad625003c599e5f4ae1fbdb6340c46c864fd3219ee67b4ea683c79daa15fb6a5d58701c7bdc1cb855054546825957de998e5bdf595662a6a7e563129236da0e09e4b8339b67f334504b3e3ceb426a8fea6a9c9ac7c58ad84e8cc97ba9d6dfb7d71a2d7d0d7f0db46ca162ffaaa586af8b9dc46f43fcf1a3193 (encrypted)