# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ba4b627bce424ee9efd5a5d4c4ab1f2c69ad92142f066be91afcc2619f7e6432
Pseudo Output
fe64be53a442deb2da85213593608be3928917600c69839470afa232c5ab114e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
943b492d7f3b9671fbe87bdd88f99edeb4584e62f4f7897a93142429643d5902
Commitment
3e3f07fa2aabf4e466fdff7b070cbdb7f9effac334242eec3ef2c231644d1578
Range Proof
672 bytes (Bulletproof)
Memo
68c404eabd0cd6316ab02f22b461bbfabf1b5e028e9131af3d5ca418042077a11ac03d4a7950f68eab44100fb7fed3afc4f5cd38e4852a33a259a2a33c3b1f98f70bf77cf60a46426978022242f4ec78dbf80c2b6a1ba8e27112634baa40d516f9243fe97862d2205c37b289971ccbfdbb5909ee5b73a1cef949d7dfe08657fe (encrypted)
Stealth Address
92b2470b2cf93c97ecd81b505e4f33fae5fdc4b77141b0090dc2dc62cda52256
Commitment
788f4ad701b4925f33e23d35c0a0d0fe99a9f5726da6b7e02630397cc151a30c
Range Proof
672 bytes (Bulletproof)
Memo
d9e1ab6c95703a1cda449be016dafc5558e6be07f34814d8cd2ed793ba03401a5b4c8f10596f2c6b334c697e591ff4f20e2fb81307013435d4d4fac4e4a392bb9e6fbb331cb9649293842504350189582e5f88cd7ad8435404d20814ee19500b08a08f03d0ee8beb7c24dbbe0f91596bb78121147df4c87edc6bcc3dc2f95b68 (encrypted)