# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
da886c50677c7a66b08fc3513d1c03a68ee9ed09574822e85cc8f7533693be1c
Pseudo Output
149a90b5a909e7bdb2615ad055152f9212abf1d23adebc553d4eb2666423660d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
849cc035bd2846e546f03f7bf21c0e21aef0572eabed5feed4be2348d8c2b93e
Commitment
7896be562b0ab5e7af3909eaecdac5ad16ff6a7d2b9cae101a82beb15c2a3b15
Range Proof
672 bytes (Bulletproof)
Memo
613407b6c6de116be6e9da2b789fd174f40e1c6a39bc7a657aa46a9d23d9517460c890c0503f59ccec0fc8b23c97a41ae2394ee8c4b976534ba6380d3c53ee4f2b58abde1d693bbb790fddcb8032547d44cdcba8813f9f39d7c742eac409ee015026f2031c547536a8d52f9a68283ca2f77085e9350dcf13cfadf362e00280a8 (encrypted)
Stealth Address
54f8e9ce9001d3e670f3af3ba091d0f081f5a4d2945531f25b4eb1da57507b51
Commitment
e45cda2e19b8e8cc7f90566b65b17498fe8e58e3a4f6ce82813636c88cfd8146
Range Proof
672 bytes (Bulletproof)
Memo
ac5d33c74369db32452c9cc15660146dc44c4d77bc821c1719dc9f46f1d162f5cb6d4dd50644fea52d30a090c913b18a44d4519d6f43f377b2aec93315985e631c2a145d4ed527635b59e11d766412021d9da658539fc382749bfa2e07e8410613451a1341d234b76a9bd0ee752697b285f838cca3f4d3c0d8bf6a07d839d74b (encrypted)