# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
48771b30f693348663d6a5f45b035f26ab3a1cde20096e936db9980473b4e471
Pseudo Output
a0d57e57e9f4abd704fa075d54916dfee0aec6b17d903391b0bf2931c9804a2d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
34d5c5011e0aeab9c43f52d355d6f9b6e6d1981b64ee6010e8ee89a05568d210
Commitment
bec5de69ea839a9c33664c568b8d7ec18f4ff2b86ee809cef174fc0977375b58
Range Proof
672 bytes (Bulletproof)
Memo
42378ddf4134e234218cacd3e1cb1419edb94f6a67e5759334c07910d25e14dc19dfdb3034693c1268ff349d170db29ddc3d46bbc7ff9388d5e3e2808f384150f418f5240d4e65c98aa3c95a69fce07eddf52964eff41a0798b4c4700d9825d5b39a6a256441f07b56512a4a6a9405888f79beba7fad668ac0891251a56af48f (encrypted)
Stealth Address
50310c971bded2678c71419d5b8fd6c34e8fad0d56d528b9b1a95431cfb00c15
Commitment
c2dc7a5d62d0aa6cabc358e73d9740ac173c3be2326ae5e2ef6359b565cd7973
Range Proof
672 bytes (Bulletproof)
Memo
62c89dd3e5544ed81387b60803d245bc225bedf721efc226db529bc1279f1d7cdf6f3519df5fabfb1c3cd09fbc93a310f1b40c00a867ef26b4f2a3d35dd21f5357d431445a4b08ae4d2f9036244817297ef37a4860eafc33e6aaf6b84885265e399d9224dbeab933b90d0e499f5c6ce19eef888998149a8382d17976a131f861 (encrypted)