# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0484139210dde3d123181c54ab803445d639069b42b7fac1dbd3455bd7dfd21f
Pseudo Output
dea9352c605c63d04980121095a1002bfec5aeea07a21e2005e25540f4b9b74a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8afb932e67869c63cb1b272435b5293c2786ac7dc2a5ec4de9b6a78eeccf886a
Commitment
90edd2582450cf0ecccfb463d20698a3dc53ad6a97cc80f418561f79ac368e53
Range Proof
672 bytes (Bulletproof)
Memo
eb1f1d8b717b7afd2bcb9920c38732d45f80080367df32abbc64aba403ec89390763c2289e508fae4fc7a833a440dc00cf7c15c226558bc3e9585f369a3416a1b4d6a934c3a6066ccff10661e5ea590acfb5790216552d75d4f614faa4b9050f34406558fe7f5030aab48e053bfedfc0319f3cd35f367fd4750f8358a2a09d3f (encrypted)
Stealth Address
964735b8e4569c9b61857bc4416606dda01c3aa167ccb46a3b3788095be5a77c
Commitment
ea8b6f40c196ed0562f4c18e177511fec6356913b8e0e79895493f3afb7ce617
Range Proof
672 bytes (Bulletproof)
Memo
b378ff616de3c5e5546d809631e5f5f5acb08edf9f4aef0cb2f3050a22785a57c151e2b702dd4f1a92e93b67a99a57cc895775ba3188be82cf5bd0da157bfa7e4f3e60bec812a881a6d0ae2712aabb0df2f8d98b7a7f881bace22a9389b8e81f84448c7c499fb89a140fbfc6880fa7259fde50912dc46f61b4cf5fa0d5baccd1 (encrypted)