# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b826da517c6947c6c20420a6c133565378de913a4064e5b062fbdbf62e726309
Pseudo Output
340208c8e70f1b6a908f9e53897d76857eff45501802eef0b4b43d61806f867d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ce0f13064b844016356034d2d255092a1bb4152bd89a25d6bc593d750a8f1d39
Commitment
241d79dd7dd9aa2e85d2825c5e2aa03ea03883eec95ff7e5c200cf6e1affec09
Range Proof
672 bytes (Bulletproof)
Memo
266bdb65c896e0f78b6f2f482a8ba53a32e8feff985211f4cc4e3ac093531b0fe9933d61aa901a79f5498056523bf75f034427e56d59474580b1c712c34d7a1281aa1646708db892ad70d3799e92062c786a3c21d3d564d5c378470c46d2e3ce44bb2009e8f9de904159d785e823e4cb73c7022a585858ef3f26b7de52f179bd (encrypted)
Stealth Address
a21d392c82195f3b8d2d987a230335dfedd76698a88b4c1824c59a3e815f3928
Commitment
3cdc9738f354e619755e229346c4543bd26ee3ac3c7392874bb2081bb3f7b565
Range Proof
672 bytes (Bulletproof)
Memo
6c9d1d3292d83a12de34094de06fb0f0b621beb019d2e0ec0b962bb3745fab1bffb088ae463f114e900d6141e63bd7a24ffdad8a9aa8cd91627ede4e5e0a5d5ab2d700dc6b89f248e710ff17fff44898c22a1fffbd2efcfa960ba6eae39089fc6346da735fc7685f35dc683d362d67069c8a37058e5b917f5c05811cc77a819c (encrypted)