# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0a00f766b19b4474ab747bd3cbdbc2c6d76ca535148bfde7fcf4768bba8f196f
Pseudo Output
701320432e89cad6d531691d2f638b09394c097942b64715dad839491accde3c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7ac0635be92f583e2362a223372045d8b02af24504e544d8f85b52249b79005e
Commitment
fc5ad8e640ffa370e2fdf27f38c3f706733fc9d09af08d9c7b9dbcbdaab84e77
Range Proof
672 bytes (Bulletproof)
Memo
26d5efe4de9a6dbf876202da3e94e7812ff86fd7cf7a56a1af3a3fe7dea954b48224d6e1bcab9645af4449eb96c0ff00f212bbefffb098d19b2784a23a8b2131eba8e5f48cf5eb23c68208e119c0234183cfdf9b00d832954b7c10e5c5fbc1aad7ffcf61292f92ba35e9f7244d836dd80d1d32c2396a03c7a6a5e7e7ae3bd8df (encrypted)
Stealth Address
fa6a4f24843f82f684a2638b1ca3ab1eb4c0048274d062fe26ddaaeedbf64947
Commitment
5e239f5540304cd396e43fa023e1c2eb12027d6a16746bc79d4de70bf4b1086e
Range Proof
672 bytes (Bulletproof)
Memo
13dec67b732823bd722ea6dae1e68ec0d88797569b098afe1f0c18c1d9b0eb24d38e4cf2bd50f1c59777d4e8a8046b081c955761b601e1457c48f2371820f4964e853ac5786644e9f213b8b845ef7d032a31a46fa742d49ccba909d07d092a3ee6b92f2e334c873cc1147dff4b8afe854be5aa180de5e83e9fd136106e875281 (encrypted)