# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3a5ba0710b665dbc5144ab1a4174b2762208aedcf24aad6fde20c98121fa5b0d
Pseudo Output
8467cc9f5d42cf5ad7b69049cf36c522a65194d19890ae2f34b88dba2444dc74
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b64269719e2ba880cef4cfe4bd5dded67758cfa5ee65d5e502009c0c2176147d
Commitment
90ea9d302a7d45681a24b7b1da834499b6511ec3564a0178c1c1112225f57365
Range Proof
672 bytes (Bulletproof)
Memo
cf6ebb694c8fe5750baf63b5b5600343c744bd0083cde8cc8a893896e334353f61d7cb300ab2b13800698e8484b027fa488b9b86d03f942876d782c01d52e6affef7afbb670cba0efcc1d2956517ddbfb13a6cec32cc34f48510d4f6c884ffb9a34a71a6695706141624a3928fd3338778e775ef9aded686f24323e772056b6a (encrypted)
Stealth Address
c88c71d8f5d8ab93702d292a05a9fc54bc38843c0e41a7fbcf942e0e2222002e
Commitment
3a27ff84db59a368fce4f53fe75ba9b2fe70bef8c112b0058265ad6e4b653a11
Range Proof
672 bytes (Bulletproof)
Memo
fbe39de38afdffeacfb423a89fb30f0a047c090af490c2bdce7d12e9b56ff5e192614ac285b0544666a512937227c725b385bc1497b8768124e98f266c0a9f12f433eb73af60e5dac9cbe44a02636e4de197c2000ee1a1f8905211dcc8241ce9a24149515609fc58388ac7ac87f27e2e8f69044355d2fe6239d6e27b35a3592e (encrypted)