# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7a270505ee165eaf6c048df3d3b38e0c53636ab42093e2a3baa305979955fa3f
Pseudo Output
0ad36f8dcc2bcf37dffeb07e10fd5c80d77cc0b08bfa735259cd66a0518f602c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fa81c87e99142f5e8b64f01b1a811fd94f0a0b246d62c3c47a8525f6ef12e049
Commitment
28704f6a4bcce897ab6ae96893d069bd9bdaa167d57bd408caa4b7f8028cb527
Range Proof
672 bytes (Bulletproof)
Memo
30b78a3c8760e09806264ff5ee3ef803b59e5a86cc4315336131c88af8ce24636004474d9e8c5447510572c7bba4e69767c0f64526ac4200c1f9d2bc74aad0859154fd50f649dfc080f32aa2b76896a82366b58b8124fa9a9fee6f807b7d11f7a793db7c1d89c847136ae81c826309b205a8c8d645905fe9b038689ca994ece0 (encrypted)
Stealth Address
dc3f5836c521eb8b3bf9f6b4f5a123a5d76f4e1e4bb6721fddddc53d58845b1d
Commitment
d430be78b059919a8c93d178fe6acbd3e6ec26273b5c99244d3a5bd042ef8106
Range Proof
672 bytes (Bulletproof)
Memo
f079cca7b2266a7ebe56fb693c93e0b0c016d515fbad8ef8b7f91e2fc4470400e2d4abcb35e347e734c3f801ce3eb5712f582ba6797d4890c1466133dc55acdb40cde601681f67b23c412e148fca573d26259380a4584cc709c4ff598c976890468dc7f226317e806d1138ab1a5f5dbfeb14ca95355bdb77df95f87c51817c2d (encrypted)