# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
caba525c5596f1bd54032849bc96a797f3404c21e519f07acbcecb36b581da64
Pseudo Output
02dcf08848feb718b8641f668e1dc49b89c0677f47c2c3863539a1b4ca196830
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
84829c18f5ff5733a81b180a6e0105b44e7662e1243c208cc01bf24160be9025
Commitment
bca3c3c355cfb359895dcd922ce6e52159c8e7b74036a2973ce61ffcc734c83b
Range Proof
672 bytes (Bulletproof)
Memo
300957ff3cbe0b79456268a9b21a9c74438844cd39a6ad57c1464de5e8d0f7606af2b5bbe25637298c1001334db0c96b318c5de016cb52f74c5b0662c6f8ffd5352ab82e2742132c458894e91a7757a73206869cd39696ba29465ee2fbda8a2afb769499557710c6702602bb028fa0a351a542b2e3ffc5508ac21d064e3f8791 (encrypted)
Stealth Address
6c5ccc0ebd763a5035c17fad29435dd82e9e61ea5f37c3800245eb54baa30753
Commitment
64da25540598cb8b25c3e56f2250b03084a0b8e95f4381488a6079afbb4d307d
Range Proof
672 bytes (Bulletproof)
Memo
2b78a90df71ce7bacf07f2b376e6573c9ff363a4b48855fa4845cbea3e471cada98dd2b849a8567381d55f6f1e67bb5b0f19ff69988a8b8b209e266699b5066f7469f10cbf1bc0eae52c1572b3e820b44dce149c8dc2ea1f8bd386f8b708b48a94f5a5fdbabfbe2c05927c0691e29d0c0bd4ca436902094e8bdb5a00eff18a5c (encrypted)