# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d87e6b5e806864730cd1c2ca332630d903765685fd6191b5c3353a93aff22c5a
Pseudo Output
888ffae0ab72c3369017608aea02b8c0d42ec2d9d4926a946c130c90767fdc76
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b2733f68b6154440854105a2b97e40e6e0c87443348535820c008b46ada22237
Commitment
7e8e0afe7676a489e9263350c67c06718936328276dec2c233cdf8a3e262c518
Range Proof
672 bytes (Bulletproof)
Memo
a80d0e6eabce3e07e9cbf17b9d1eaa03d9dbcc22c0a8ba15c9d8e1c8d9b981221a8ac02ce2d512e9f6f6387fa333b99d386d49c12e48dff0bcfb88499e730f38235b8f0e83823b6bce696bd2d412cffe6dd25260e26b56c999344044f4d500cbd4d3c6e2c2f4cb0521524832763cf5e1e868a0daf8079bef6be2e302a5b33ebf (encrypted)
Stealth Address
8000c7d6acf61b25cc14b347655e8778b872d11e85acd96a5f0251524e9d9710
Commitment
02eac8c1ae3135b979313563f7d3fe3158341ba2bee27406b3af8e1e060d8354
Range Proof
672 bytes (Bulletproof)
Memo
7a238a2386e1383b81ccce9d80f96ea8922a24f53186b714a17ddb45b2da8d32a19fe0da520f495eed1b62b06689b3ebc44e3d43dba28c952d496a1982cf97703a51720f3a0ef8bbce96d305e6d026f3dd069d63984b2336d66e5045a38968216ccf3e6bf0b0c57a63fc26c0b536e5f797497b1fdb44d9b19fe9b0759df31613 (encrypted)