# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0ee1cb633c30efbc2aa56f763757816162910b0cf1156ebc9693b94e4b8c0d2b
Pseudo Output
b207a806ce746fc17f809451136fa29d1cc760dc9653281f16bae612b90b7111
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
34f177a9c217ef49365b174550aaae75b9b361a16913a801f3d39f9cd34a8d2a
Commitment
e4f1085ebfed8ac8475c3523d7da37d9155821b5fe5353d7fcacea4fc136367f
Range Proof
672 bytes (Bulletproof)
Memo
0b415010d03439d5b342beaa6b27af15f9b2d3cbb87c5342ab55ed3cc7af6aa8f574e5e64a43ef1dc65aa5b5d20da04cb6b2f4ec8993cd5729c918a705cc407bd47153e8117f4a593fc5462e3dbd09c778b53ed909ee78e8481ebe8e3d2ba1ba78895f5d0badd6d0707aeca23bbff2bd17dc9168679ed23484249e88ce691e31 (encrypted)
Stealth Address
ecce8fb489e4bb0bb2e58743337a9fa67c493dfb662fab3b28ac9c607feac110
Commitment
a2a13f2fe44adac314b2633ce1380178eee2958da2849f50d5f8b71fc5bad449
Range Proof
672 bytes (Bulletproof)
Memo
3fbaddd141af254ce4a1c5caf322f8d933857ad3ff7b64e82a94218794bd5479d822d4505453d05dc6d7e7b4457c0c068b58a119ca97213b93ad8d4933b74c06b5c762f2693f61ee2b21ec76c4411e0249de080e0e9b05e0c2a15076dbc8564a20dd2f429858b4fd36b3731d1d1cfd7aabb13ebdce0cf71adaa53eabcd4ef782 (encrypted)