# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ac001a2447c8d0834b4a4bceb67dcc95ece21da977fcff56ea29a1ecd2bf7c3e
Pseudo Output
c8717b2870d33c66ac54cc23cfde78ed6f8e3d69ccf240128b4f24060e013f66
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b84509ce0b2e46fcc5021bafe9725d726054439ab511319016c98764b9abfc0a
Commitment
9e12bf53167871cadd0bea45d6a1a622ea99c6555ce7aa593c9383dffd548219
Range Proof
672 bytes (Bulletproof)
Memo
c2c0538376c7ac45d3f92780d51960ede993d1c71e504e6beece35ccbeb739f754548e464fcd5c0154932e9c2fb9130e1df6e278aeccdb0f1dd4ed4c5fc1f0d008302b0103ac812974bec2f2d7d0d5bd77c4c480c4271ceb5f995e8a49c52555eb8f2f066ce790071de218a68e8fa436f871bf7443e2d3f178567cc079f54e39 (encrypted)
Stealth Address
3a94992dc5cdb7d2c0ce62c49299ecb6e3d2cc5821fc35da169426909e090b29
Commitment
00d4ea3d64c2c997ea25ce85a59c63676ca6880f7a08a22f6f70cb6783f95d5c
Range Proof
672 bytes (Bulletproof)
Memo
8d41f26a774cca961315860530455c2c6c150d09b339efa885ca6fb4051424bd64f01279bea8b76d818841338dc584703db2110c5176bf4e55a269d2d011a4932b9fcc2fc3d9dc0af5be75dd9426a6271535acf14bedf0fc58cf3c315e9168923fbd73ab9741ccfd1b536334ae2d1174b159b068b5494cea897e8f79d3477565 (encrypted)