# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
546259b5d991be2fd8f87b9985d98fa7b78fa761e59c8e86a9ce4558f71d1c23
Pseudo Output
1040a9acbf65e2054f4dae30f65488d895bf70f1d96f6ecb0b4f46386b90ac0b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e69f14b1787c5bbfdf8eb3994f831974f1febf37ac2c883e3d92f996aa89d94f
Commitment
ae44c04874b226ebf3f09ae8cff960a8bfdaa2027e118e42f4ea47952e037f38
Range Proof
672 bytes (Bulletproof)
Memo
024f9829a8d6480daad933125c204c2d683843f4d46ccc025467c204641ba4d854d57fafb297c288155fb4f0128104f3cfa60bf9fbd9683c8226d6cf591899ee3b2ebe2017d659cc89eeb9392f80953b537e284c90283712e307a5f4819bbdb1f58509038b7b074a5e9e6c220203b0e4d8b66243d810c3221389aee52e6f567d (encrypted)
Stealth Address
f81ae78b968e6c5a1c8ccf4b3453deee28c29d802a0604e1eecf6506a788e024
Commitment
beb35d2743c8594144e0b2da882d32f54658e20f8fd0ff1d649d262fb210062f
Range Proof
672 bytes (Bulletproof)
Memo
c51f3f431f058dfe086e4bee5a33417cc75dbdb1e4346664a92628d8c588cd44f311e0d951d735b03f8266795242140bf8d43ad12b10f91a3fbdf6214186e1a4f9c5aac002dfb7cff94b0417840142710c2c0ab8ccff1d2e7c4a5f0822565ebc44bf6ac730d222971a30114fd36724b7b704482995cf837c11b0c53c497e862e (encrypted)
Stealth Address
2c15fac2faeb1aef8695d65298a58b5a1b20b0a86dd9042fb9c10eb45e3d1270
Commitment
8855e187ac9325fd9a2155e18c20f79793870978c629a0846fb0e3a630aa0445
Range Proof
672 bytes (Bulletproof)
Memo
e196fee46074bb5d014bb50484d30cc068de3de6b878422197b21d9a65f98f003af4032b1a51aaf4504ae7cde1af800c8b4799aac93348e0349527757f7caecbba0e8a4cfe90b058c2e71af805dc5351668655cbd26287e8364582d3b518b9a554c5d83d2d6d07eddcbda3b810608a7517751e1bf7f7978e0fe656176aa26f31 (encrypted)