# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2a1976911b28129ec42eef16a9f93516225f91e6ea203c5b55dbea36be36943a
Pseudo Output
723857100b32d2564c63dcd9a281738cdfeaeb1337802a861fad9ffa514a3535
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f045f01062093d6cdd8e646d22b61425b809dbe849afff4fb0b7138b6ae8423e
Commitment
c2f0c66c0cf32ba39334ddbfde2594c7672fdcb18353b043988fd890a098a245
Range Proof
672 bytes (Bulletproof)
Memo
aae5ed4c2998c5c0a9003341b2f6c043705110e71ec2c11280c757e9cfc34568e6f5d88abab29a0e9f84f2ec0ce5aec24f769defc71f85f92631cac8ab90c5d9caa69557d3ddce6bd9f5f9877412580b75a1299f640284fb60b7fd3381d57c93fed31e64bd73ede1788d3396cb08ba505c647764771bcc5fcbe8bc0d9c21ee9b (encrypted)
Stealth Address
d2d197a69b00a5ba8c4bf555b2b8ff58266d18888efe2600f0fe7d8757f83b40
Commitment
d67d38059062e632e424f2afdeeb3fcf88b39ee79780fe83ee00b745cac7a524
Range Proof
672 bytes (Bulletproof)
Memo
e50103dcff2d9f1d1e8f9c3c5e0623c2c28d7417a7e5bce60c7eb840c63f6979372907a22e55246dc3147df6662829d43049595cfbe304d326ef00c18d1a4f18526ee62a7d123587b32aa00ca41fe1f266464bf93054d719adf77f7b9232da12402e6d1b214cc20f7a1bcefcac4734890ac172d9c4422a67b00838df0d476309 (encrypted)