# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7ad3dca311fc39f882bc0b94da58743233c8e342eb26ae5fce9c19ba290c1109
Pseudo Output
e4fea1d70af19060062fc69b9f8fc6ce4fd3af3d4e1ddafdf2f16711a08c0863
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
90da47a4df2a13509d1d09bdd2832181c0fd63d005d68bfec8100ea6298e6e64
Commitment
689e697ecfb70c91be78df9d8d7b5da6004cc355c393847712ca8be5f7101653
Range Proof
672 bytes (Bulletproof)
Memo
f1ac112bec684f03c856a18f3cad029f3f30e2d6b238046cd8d9462f4e1f017246550fb9bc1d37355e3435203c2c1887a917d1d217ef0ef402115769ef477412a1196474e564209728b482a22b0c2347a2b14c16db6897da115a8700333133d71e7db1c800bdb38a778587d730cc32925ba34c578494b832003ce4d4cc8c3204 (encrypted)
Stealth Address
bc93d61cb0443b120fd01329d160cdcba525c5ec0660ec9063a784c5b782e10d
Commitment
86c086acce0f621caa279296bc11ae252bf3161c9387bcef54887a935e445512
Range Proof
672 bytes (Bulletproof)
Memo
1e65af9efabb4fa4194236c5d2d412f0ce0ed03e4ec3a5636e27a66a5f2cb549f0882befedda8570971cb1946fd627321a980b527c5982cd3284b692bd759e0fcf8c8c40b7cd79add7c0f9b9005f3f1ca822ffe8483eb2fe72fc73a370bea6df57e6c0201f96313efc7aa5c5ee350b1307ac19a11bea3f446496399f8538f98d (encrypted)