# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2c6b48c0399ca9adf9772d8daba34bf7e72a78e7473bc4b01bcb28debc14b63a
Pseudo Output
128191433ac80651311fbb9a6d1847b88cfc4ab68eba50d3bebadebaa49f9b55
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1235180c2e18c97d8e5608bb92ae44a5644c0dcbaf08e7970b8f1c2a8f99581a
Commitment
12b8f68e7015661bdb84652e582005241287169fb0d7a488104721f7afd5ef7c
Range Proof
672 bytes (Bulletproof)
Memo
99eda0ba6b770eb637fda1f25cde3b7777356feaa4f1bfc1091e291f76d1ad2af3118a98927febe97f95561d24086de74115321c7dfcf7b202929d3476749752f2db1745ed12166e05842af1dda7dab96b9695f03a7d4d7cd59f0fb99d9b9bbdeb73fd1347c35ff109de1c4c8a409cc52712fdf4310f80fa0bc3d8cd79a9de41 (encrypted)
Stealth Address
34a381ce0686ead8044c0763eecdda84fa0042a60da5a57d3d40707f8ae0147b
Commitment
82053ee7ff0a7d096e6b03381aa709d6ffdaa7b0522355f2b1c3d133b8d0c175
Range Proof
672 bytes (Bulletproof)
Memo
847fa384e1dfd6d4a1512086bc8d60ac935ffde6f14f68c7714b953f71e569f4b90dcb78646ee8e6f3df3c0d2df236543560d90f5dee21216ba907a8e1783a310b239367d28e85dc72b5e4e8c13922868f896a605c3fa76ebe86b9bfa8abb8543544ef52e770cf17576a079c430d41815a2a18df672f57712eb33870fe94c8b8 (encrypted)