# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6c104a0f7b460b09409fd1df1987c39cb2adc3b3a0353afd803291b0e500e744
Pseudo Output
ce3f7319cf7bc9c7484f95a022c3de966151ca846b8f4cac1a21b04d9f5da159
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
801e406140e5c70afac8a98ed6f3d217e26a50d0a6940dae02e5f498bc6d8122
Commitment
f2e012f5998c70d7f9f5273d541fccb491a849449abdfec5215a58c9f8a97e51
Range Proof
672 bytes (Bulletproof)
Memo
1e782a89a0f8637cfe3f775d03d8367b43177bcfbc456ff832d71063b192c128b9cd310924bed5c24452c7521c371a0bb6bb5cc96dc5314900b675bd348ed000c24f31525a90394526a345136641d4ee1857bb8f4c43db6556a1e4de28e39498f230c0e843b4ae09903330843b94b006f17df0c8a8022af48dada0bf30fd87f4 (encrypted)
Stealth Address
72393ee9377fdf536d8762ecd3289f84aa936e01e31d8db491c54c5ab4e1f74a
Commitment
dadfe7e50649bf2f7d356868956ed25886b1957f17190e8704295e607f6b0e33
Range Proof
672 bytes (Bulletproof)
Memo
873e60cee0e3e2063ae3ca571b4aff98235b77d4d6ae6bb7674029a264761569756f048d249b8d16c40d380878428ac1eb7f59b92d6a37f9ed7e4da251fc9d4a31837b36d77f02eac9bb6dadf96e6bf918b840971b141b7322fa0e30764eb6fa32497a055af335014a7451001db8a18454b80a93bf7339ea12b28340cec3c989 (encrypted)