# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8ceea0b45bc3d06c4b3e1aef746549e7bc07045ca6fc88978ce4d4f3fd1b165b
Pseudo Output
ec7f3fa7cbe5915f3d6d66f62ded0afbb7f3600d85156e4e2ed8b7f5af39aa0c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e2f8a249558d2ac8d036cf1de78d5ae2a63d91a78ee79060597a99f5df6c4f18
Commitment
1c3d4e028f7e452ac06b80fc935d73320949149102152e1a32fce1a93485885b
Range Proof
672 bytes (Bulletproof)
Memo
2720a2559e5dcdfaa6646e2ed1352dd1b0124dcadcc5d18608d9749094dd53353f999c7bec48ead8be0f1861a8fbd0b2449754b62dfb7778c7d51636feb4597069f25f7a8b76e46d2b431daa7af57dc8088e5e20671508aa735cfdce37f9a3e8aae9f8eeb3bc07542c88b6db4cdb6353784aca02f56b367d9228120030bcbeff (encrypted)
Stealth Address
0237c468693df0d4779bb2a2d032d1a8bbf9c7e53832602caa0b5a8e74078551
Commitment
caf17345ef7ee6389187b52d2daa84cec1e4ef369ae2721c20aac6a0c8dd3007
Range Proof
672 bytes (Bulletproof)
Memo
3e624af7cc0019686de818ac40c99e0ba40d5cd80a754cc02f8911d60ec79a1368f4dd01c76c69f94361557b17e608e72fae3dffaccd9cb541e71cab6331917a72b049537df5314c842bc3ea81ed1e94221ce9c96755328e2a6dd33a20a50e9f4f1472390244e5efd23799e5817cec925e71a888570017a583e427fbb51977f6 (encrypted)