# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4eb79e86306e192201afae644eb14f0e242b216443c419f9b2ea1dde811db257
Pseudo Output
84417ebdea8d6d7fdc1e13bcf3125504e734e6180d76909a53568dcd8f1fe252
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
28973fe1cc458af66cf506acab9fe6bf5ffae16ff1206b45b9399b3cf2c59740
Commitment
387af114b4285c5cc12836e49451db1b1b3f9f70d603f0ec6320d8511f148d38
Range Proof
672 bytes (Bulletproof)
Memo
e9551eb7f32df86047085f21798636c1e76ab6b46afcbd800e81b4c9b6bcfd18ddf62a2644024a61749f9b86bb79f7f2cb887c82c3decad8a218bb24cfd7c0e138ee05252d82ce5cdbf00c2b7570bb461a271b26d427981d4c743642b955de708e6d3fb131c9fb6003d5d2330aea00256b98b9614b3de6279d4de3c208877fda (encrypted)
Stealth Address
c81930d841a9611d84f344ae0994456d756953c8dfd772385fd1a5b94e9f3655
Commitment
a488ae9d3422425d1b63a588e4efb678eb2176a7c86288b6688ce4ba1007be32
Range Proof
672 bytes (Bulletproof)
Memo
2b58d66689d69a5ae851726af4148a9a7365ee556798d3d80f2aa20c28cf91b501dfe6dd9e416f3e38edd604cbe1c394c92f4ab3945a4d77dc31e580b702db11d0c6033134552434e3777634f2a2f2b2be651cd08dec9195fc5c500db0fc6d297e6ed620d6848afc2b73e5094ff09c2656969a367fe94b48f5427fba9bf2ca22 (encrypted)