# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
48eba37fb154f53d54706618d8f9ab2a89586c7113bcd8a76a6deac15f6a6f40
Pseudo Output
e02c28de1689108d6a6683034c61da9de1f19f1af583d9a5f1a1e2fe6c6e8125
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7ebac6b245debedfb284ff0f223d8533b7e38d0d10e2450dd15950a0ba264f68
Commitment
f61e9a40f2954de17adb34b820b03edee93f474872cd0248e586061131e4a911
Range Proof
672 bytes (Bulletproof)
Memo
a55c9ee3b5e7037e36d80bdc7f3f7625a93c99934ed554368ec0bf939e562c3d2c9509c96685eba8c6e6a4fea3119ef40307f96e2d9e4195aed318e18e6d82c160c21f9505426344815f056db67a58a3ebd56559ab60fa67fbf514440e0e94c2d3ef85564abb4446da8c58675efdab96bb933af951c4e7d2edb07c7f043c0eb7 (encrypted)
Stealth Address
8044c6c1fbfbcbe99990912d8c6f9305ce7b7de52623486255b3efd877f2e566
Commitment
fa20758dfaf12c3cd4f0479c837f880b4b8b8f86bc30d2caeb23dc509adbde41
Range Proof
672 bytes (Bulletproof)
Memo
8eb434b1f53d070792a47eb9cd1253f5316195128a650527f52a073705352d5b5f5f6c5e1295f0162a624ed72b31bed028e3d6cdc312a016fa60d3df39b6466e6d5e160c68baa2262c14bb72b7b75617e118644eda2c9cbbebc571794bd4884299b34476fd90ea1250186a29320bacfc00b4a5b7c9452068e9420d54af2abd01 (encrypted)