# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4e7902d59a957a3bf26f0fbb5f43a4ddeaed24176a025aa2a83bfdd51fa88e53
Pseudo Output
f2ed85c2663d36f7cda296a8dd59302c02caf14fdd0b7063d6321796fd15844e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
76292507db13c1355e54dd78aa882bc0fa74a817fa15e2f869afb0bfbb029b32
Commitment
e2fc1ff1836304e25dfc75979e5d2f1725c5e07557551330c99517c2c918f960
Range Proof
672 bytes (Bulletproof)
Memo
b30ec3272bf973f0cd6bef0bf7fda5a677255673131bc15140a83eb0d83a231baf28e50b7f57beafca940cdfa5f798353364cf9000af6237176cec4abf6a2a7c4aac5a530662956b0093a31e39ffa9872d15edcef54cd9a5e20758509d1ce01be6f77823a4a5238bdde925dc0665401d379efe5fc45f276971df62bdd0a3d741 (encrypted)
Stealth Address
c02ed54dea062ba3578f67936ff4e18833b4f7d932502e5d225ab35d290ea756
Commitment
26bfb58161ab06ef0dbcd298ea777c336bd9d7b933d620b58259a1c0f8a33304
Range Proof
672 bytes (Bulletproof)
Memo
371e84c8e0192950c0a9a4f78acc7b9b6e55ee4beb0f7a6e7d2e64ca1ca477ae1a413b82aef2a8eda7952e71e26ab6653db02a5e4a594de432a2186beb3e40902b763e464af083f30ca3ed9b26bb67a3bb51a79e4ba9c2ba24e7bc2d561ae391b35240826325c966d7f2aa4cc5f772df8d2dbaa5b1a8aa4ca2f98c3ed216d9f1 (encrypted)