# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e4038c61e786268eadc4b282ac91642d69a50a2c256f29f09f57c13a895be167
Pseudo Output
c21495edfea5de2eabc6b67690d4378b0b186502473f11e5c49ed8138007845a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
202a7f1c8798befe03897e958a1ce11b66fbfa435f04c9d315d4bf256231860f
Commitment
fafbbcd373f731f654e60a1efbe4b0b97c734b7b28dc6101b20b24a1f751df29
Range Proof
672 bytes (Bulletproof)
Memo
497c1300bfc2587a5b2b4fa0bebab3b8fe85d25ed52f42d3366fffb7c9f41bc59a4663a29d4dcc6db337af2d528bb443ad7a5c2813acde3a25f3cb859e82ee02e9eac97b82360c0f26b4bc90aba5b375cb36eeefac27dc314fe2deb24bf2ebb387cee9ccf77935d1f5f2a516064e06c49b12cfb1a26a4d3bbf8d04387c961571 (encrypted)
Stealth Address
38f05c105a54e49bd64bca4c017af12a88f69ddc81700b7c582cac5a8008307f
Commitment
f2f043e7cc131455cab29f589db55cf2b444dda77ee3af3b1557a55a4ab90136
Range Proof
672 bytes (Bulletproof)
Memo
475c7aef6068bbfec1813de831a938304f85631ef830026739a2d811280677c3a7505cd8b5873214e92eeea110d0339769c5cc7327bd37fe378665034b81c1c88729d3dd46b549fd1dcc1fc07700bb21d186399cb3a73d30cb7f0d3e57132a374c095e9f05be5c9f1f039b46c979dd6e11e662a7b8a8044650f0c920c2ea02c2 (encrypted)