# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
463f39aa4589fa4b69766926baa52ed7db0506dea3ceeb7e9869d1afe5a3d541
Pseudo Output
aae590d501195e7770e4721a324a18ae950b27391a048bda795ea9393897120b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4e9e13f9b767e0ca8c874468926a19bd0a1b0a3ba775f37ab3629cbe66cf8844
Commitment
bebc1e20b07a3924f9aead4b7a24fc5e88c958bcb2db1b8d547cfdd187a17200
Range Proof
672 bytes (Bulletproof)
Memo
92495a49ee3d30a2c0f06385a734c1c09a4208f11050e326969e27d43565589822bc83b0ad767d503c80b5b4d91f52ac14b34f5efcc2d3f201d2a830d7b140e86a093029c7704eb1cfdfa05f079931d601256b35cbbcd594aca2595d0d5c87dcc8422c450249e9c4e4c1f4ca4332079261e07eb4cef5f826171219c98208c4e2 (encrypted)
Stealth Address
e2d7e15e3c438ff2bd23279b1c5f18eca3fc49438ad9cd4f7fedea338e56b102
Commitment
bcdb5d0da435ba98d682220d891a5c71c6617e87f5ff69c43c8d101a23282934
Range Proof
672 bytes (Bulletproof)
Memo
cc136e0988609a560a9cb54a98c86e28df558b5a856118c1cbd9056b00c879727cd8759bfd8437de398f05d126141291da07382e0427845b1cededfac0b126d275fb67643729dcb78dd3299d03bb7bc724d2aa58e1b8988f767c1e4620a6ec1485141dd999a0cafa3e687273f9fe6a775a91be479ed130c6bc66b49ba2d4efa1 (encrypted)