# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
223487b0e5c4aca27629d29e35732d69dec4e7c45a9405ad9e63f21daf06d622
Pseudo Output
78e845594a2ecd15bb21486c082b67975c2610b12669c2843568fda9f1a9ee64
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b82d44222f2e3aa6f796ef4eda2138996b56bd7523ed0a0a9547cfd868e75944
Commitment
84ab82dd0ed3e5ddeb63f6b350300dee3ac92ccf66f9766721c32b9dca44bf54
Range Proof
672 bytes (Bulletproof)
Memo
1681ea204c65953197920721f98ddafb141fc9c8eea72cbdb2ee9d1bfc2c3a1dfa8e9334d5d9ec8444586d6cf46b98fe7ba55242c1d3f05683ba11ee7b9574a18226bfa0ece111652359013a1bbc4122033537f59a4ded9db69844d7bf329be180274a667560862a75647be47d8f334a415ae9f389ea6610b9d1d3b7e8aa646e (encrypted)
Stealth Address
0cede5ea78087714dad8942fff6e126ca20efc5cf80683aa73749c4fa9f31708
Commitment
c86c1f6306c58c43752b9b696c1aedd6a84df004d593b1b1abd4ff24c94e2335
Range Proof
672 bytes (Bulletproof)
Memo
14b51794c10c71183ee808622e3332fa12e014dfd55ab664f9774d30431abc628f5b01c5b961d76a098418e35fbea7ffa7778b743201ca7473fe117ad230f97ba29196dddfc7a9a7174c8c968c35b0b83cf333234d3ed2a279805257054dcf54075a297dd84e8b28b3c5f85c19f16509b74b926714c00ab85d4d25ffbf1117a1 (encrypted)