# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
da3b7fb3b0af027ba3f2aa2aae76f856d20711b223373e2edc6ae4afb2ac5a12
Pseudo Output
4c8ee88a78a5b0fa13146587fd1c8d87793fe7376cb4364bf332410b8bda0b6b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
dac3f68d2b1cddd977602f21daa3dd66a23f8532808fd202df1b5c4a8a13cc22
Commitment
90833d0d5550e1e082541fd90772dd85626950f07deca824a47f7a0c9b6e2067
Range Proof
672 bytes (Bulletproof)
Memo
d489220c756ba757befafdb324447742e8efae0fc787062c0a280d3f1ebf85c7ed5fe54a13daefa5519f9957ae3a501ed3341a1000a48cb878386999ce90066af2c2e4d808a61615b5a954ad7475593eb301cf6a924e7416fce51dd853b2995d855e70caffe6ed2ae9783c91b1b84056b967c2c09048f607c246db564d1e1a9d (encrypted)
Stealth Address
b6f6a21cb9cfc65859ea823f75c637dafeb86a225bd9fcea4100884889423160
Commitment
48035b41101bea101a3c260647687c6e883fb3d21c1adc855805c6c3f5e40a26
Range Proof
672 bytes (Bulletproof)
Memo
f78abc8f4890e79d5c19bef594a87a12b9e819b09c356f6d45cda56d9b9bd1916e74557ae48e7a961848248f0816344712d3d356b1f92cf3cb85657255b99ef8539c091a9163da868502935141f85e04ea45a6f7768e83ea56b0c44a9800880fa55b0777ea3e29e7a2e47d3dcf6c80dd51ea21340d71b5d33fcefbdc9d67fa5f (encrypted)