# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
326a9bbe770e432e17d0d98a38a80f8a13188029e1ab50ca21c7857b7933ce75
Pseudo Output
46d62fea327ca635b0893730d9aaf84601a56dff7bfb593b6d18ad3a2dd5e33d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9e7dcc0e63442fafb4e1decbabfae54694b071218e6901f59690a973d2784259
Commitment
500cd1a3aac40e6a69b6cb1b57da0ebce17c17b09aeb18fe200d4da84cf6c174
Range Proof
672 bytes (Bulletproof)
Memo
363e8dfafc43e57c52304f1501b57f22da1328498a861c3be4b85347aba58d9418daf4be611282f33a066bbe15a9fd2ba772a979c1fc47b201b81aba2f572eae8107f4019574f1f86fb5a48641e77bf5de51683696db8e9c707571e96e297dc603e18dbc88d4460c7c45c90252518272b1326e1391610fe5d195f2f83993ac84 (encrypted)
Stealth Address
fc55f80a451e83e5c60b0bd2d1ad221709e88c2a64394adff1e4b6b19365a703
Commitment
d6ac5afa0a9c1ecf0f00561eadfc75832f20c58e9393588774a91c9b6e19fa71
Range Proof
672 bytes (Bulletproof)
Memo
d575aaf60634bba905d333385c64f0586f6c503aa126c4e136e88d4160374865d7f4d3c3c93c00a29df12dab55d3587c2714df00a2bce94ad67d386ded766fd8a60fc2b127e05fa4fcf4ff79ff3f2360e4a4bdfcb35b7c3c5a3c0fe44e493bc64c61fb02650a18ff4e6f8eb4ca2bc7ac56185ba7fdd588a4081633ed4df6ed8b (encrypted)