# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1ad5178092951be0318ba8c5fb96506e22f164e738361d1df69c4a6cf3066f12
Pseudo Output
7a65f13f9056a38e3adb0c4c150a287f76126d228a78455484158e41db957212
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f4cc3a21f7ce350500ff62275b054eccfb91aa4cf8f54befa509fbd8c1ee4909
Commitment
8639c4dc7ac40fae3b76973e039eaa6388be107e0b4362ed930d4bcadc189804
Range Proof
672 bytes (Bulletproof)
Memo
979fe5c49004ca7c21da48036d42550e16e7e0e1c4bd7c955e44fa29a0a0dd330e0266e80c3912f8380188c6b4cb51c717fed600dd5bd4060b3f35296729cb03074e78edf7216bdfdce1f6195811e6978fb3c0127ae6578b054ab94de4d15d5823a639fc81bb1a790480def214e79709ead8bb0bb67184e1062d3965473e8313 (encrypted)
Stealth Address
3014e9dd2574e49804ba996dc689719570797cb702299bf6517b662c51a68978
Commitment
3c0262ed0032c0623cf5b836eb83a9d673dd9eecb161d36cafbd315d3cbbbe7d
Range Proof
672 bytes (Bulletproof)
Memo
a90146bd22061fa58833da6c95853e3a579dc0c42e63a7a5d666065ad07cb7417227109ec48e222837ac348a27b9bf01469645e350f1a1e3285705c64c150097a7e7b5c757b0f62ac8d15a97832522a91870afc0d3d9d9fe9e248381bc1bf6b1d177ccb47eacfc6fc5ee75e4e190f3d1230ef074528ae2abe0274212e7453bce (encrypted)