# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7caddc233b2e22e650b80c1cf8a5d4d93c564f4055c24d8d2182fbbbcd6a9379
Pseudo Output
8cec73bf0d79765181d02f75ce7fbe3fd3b7b40f2972d5d4258326888a414f5e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d8048c74e9f0c7a5236997ef13e9b5397dbe51b0194b7abdab520ebfe69f1614
Commitment
d6a140e7c1dc71ec49d2a2af27d62f86cfbd4b37445ef09a9da6b7d2c4bb051d
Range Proof
672 bytes (Bulletproof)
Memo
f66edba9a74a3f378612525bb79fc538444a96e7c59b6ae21d2d827e682d3f7d10ebfc8d67448be057acf812b6fcb6d8c16526d26151f17eac1578274834fd3ed635660c9e6ac1a80f5db4f9970368acfc605fcecbf0ae1bede06b96e23a3345d7d7a2b362b5409ec36143cd71a6f18b4b0ef1e4aeec1e49066ff901eed1b39e (encrypted)
Stealth Address
ba6acdf40cc2c95710eaf7a048fe128fe0e32708b60c4da93f89be113cb3d64b
Commitment
e6b0e4d53dd43ebe9ce6389562e09d4fc73295b2935ed7516806afda553e057b
Range Proof
672 bytes (Bulletproof)
Memo
f138751f942467c9b8034604c24df69d2e2dd89cba394f911ab8e6bcea84ff9fe7316fcb639244d45d1084449e9ef5df7cb8dd6d40b624ba7c5dd72a25324c465e699e50d2ed7d82de2d3d3de64b3c0f3c61cf0fc22f3f1c4cebd0f0263269a9ef55236f289d5d2f2758bf4046af3be1a6cdd62478fd6be7c8cab8faf85f9cc3 (encrypted)