# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8ef5823e1a8ea61cfeff3a459b34706bfeca8ea6435cdd484149f4b6a1d4a304
Pseudo Output
0e2ec4bfbc55f26ead36c109047d1981ef7610d60627fb8290b253a017c91176
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a23c2915949d2eccdf5640c8abbef2378dd2c095bbda05c55af17ccbc9ba294a
Commitment
bc9300386c38d2246f9d675fce2290b06338533d51d476e24faad8311cf2bb60
Range Proof
672 bytes (Bulletproof)
Memo
6e36c680b753a6d5cedbe85c92fb3bf86886480c1f3c26c922944dae6c35ce0754f2ba4023b48d9b800f995ec2ef070a23e71ffa706fac4ff1698587f859617522256e6d482bf50718bbc6f3cf2f0c55569de511679f61b62c1bdb2ab948c682eabf6185c7a6c9fa6a631894eedb2a0580a47b803c462b5e3a71cb41111610be (encrypted)
Stealth Address
6e9a71bfade0fe44f96cfa77e1adf0121285693f00a87573d16f047d2ca28509
Commitment
ce39af436b8f9ee14c30eb769f44e847ff5d3c582790fca7c373bcde8c463b3c
Range Proof
672 bytes (Bulletproof)
Memo
7c7d9005269e36b9df38bc192e9792139fc0f7d296ef6da606e510b1233053cdb840db073a377600f1fff491405c6bc082aa7bf67f75a9bfd8ee5af59befe695942bbc6a24f34e2f8fc4ddb4bf16618bffb436a844c18bc11b6c210ca33f489c899389e465eb1292ea7ebfd5e260455504d07e75d190d0a0cf9aeb1f12661ae0 (encrypted)