# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
12198ea50aef4f89b02a74577da654af09751172923718614b535b6da91ed331
Pseudo Output
c8a5c3d5dcd486d88238290fb8bf4269d3b6b89b94fcde524fa3478cfbb38f27
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f2b7f98b12ab63079e2a2b6efff3457e8a6fb80368d3da5213faf9f710c08067
Commitment
9c1b6fa7c04940bdec3221758079e0adaf5a54f47f443c38f74f7f1863dfeb1b
Range Proof
672 bytes (Bulletproof)
Memo
0604756c343fe31cddd0538cf7fe9ebb38caca9523806a564f241f7fff59113d9fac28f8911f3964caf3c418fcd65a129580566d1ee71e1ebc68225792ec272d231e2cb06bab3d11b084d5ae52eb110f89a58aa249dc6023ded2e7346eb5460c6ec8cd638dfbce6b3002a8e049d452ef00b6d2bf5b84ade2a1c8a786165aaeb1 (encrypted)
Stealth Address
26f8f064b380b0996ee6c3beeaa6980fb7724c7cbb748bf414403630d5e06a49
Commitment
7436a5c9efe378755a39d5f06f630089a10585092c504bc1bc8109cf2998de69
Range Proof
672 bytes (Bulletproof)
Memo
c5d7fd96ad4f3b09e9c94941e1a803e4bbb6d8b665f8990408029e317b7b8fbfcdfa63106823c090cc637f56b77c1cd98a864d3e340d9d3ba3c516c3903797949e843d6dada59190d22a8b111ae57a4890942c9a7a347b25fa78ebae9b382a8756aa0c592556b9df6121a198a80dacce36e4a96f6cc92ec915a6a08b8352a0e3 (encrypted)