# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b466bb1b90dfb7a1b035faee279f88ac675af7c72a4a381c4b01034df99e4837
Pseudo Output
228dd1098f05c505be25cc639063eb3a183a7d8e6871a20b3ad60028dcd05358
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
065548562db582868d4e10e74f2511cab4b88f632a1e9213f1f3fd42e680ab62
Commitment
bcd69c7f619fae6457ed4e8992d25a738a268722b22f393c073f48e2f5f9052b
Range Proof
672 bytes (Bulletproof)
Memo
05cf79da9075aa46e8435976640ba81da812f043784287da54fb9f8f6fcee75f5984a98abc27787b7f4ff3c5601031b740839d739eb80d8f984c3a4e226f3078be4f44ff8be7c20b78fb2f7b1e64010666f6b1970ce2c091ffe6722a5bb31c248983d7797c9a43de1be77248a5fd1ae156259a98fc9e86793200e827e420cf1b (encrypted)
Stealth Address
e0db70ab708d1436aa15ec874ac5fcdf21c0f96515db82b9f2fae04cdabf847b
Commitment
6818a965a9695f3de8c09604cb90a9cacac7b3efdbd14628ea219b5a32ee0e48
Range Proof
672 bytes (Bulletproof)
Memo
25adf69af726296771ae6d97016af4e06533aa35f485a160eabc4dfb993f1c86806a385961abb5bd5c62d65ec80c7159ebae9b10ccfadc19713510d9d1d6886e46d1c15cc8c61cdc662a8b04fa384cbcc2231cffac612386fde560edeefe54431c7e80c14f25e86ba6cec9ad877171c87c34b604d398f0939065f91087a58b7f (encrypted)