# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
eaced7e5a3f7a1d93c97ff4898f0417a73f98b992540a8b4cf0dfa53f2f5f14b
Pseudo Output
26664c984152564716c766140f60456fc67fb258d41b10e0654a606f66682145
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4853dd1215d08af8669766dd64fa06a6a9eec370e6aea8c72988c991d8c5286b
Commitment
00d0cee52bb2e86c48e44e7d963e810848dd8eef2caf17143c8c3f8bd5d1bd4c
Range Proof
672 bytes (Bulletproof)
Memo
09f94b5a0a557bc850f512c5e12ac96b7d64680177a9d9c7e1a06fa82d8d0b81148f7a0550f0f1ad2a4a7e6b1683168da2d8c97e04aad68255e9b9d230404ebb218d75539b91606ade9bc7933eba4c0a1767997aeef862ecd435eef17581bf12c532bb61482d3682e6492b041efea737b631b0301da316ebe10a1d710c1f52b9 (encrypted)
Stealth Address
a08991a89c2f3161fc37e8aef6e930ea8242e9deb1f043e30fdb2376cd35ce14
Commitment
4aebffc566dc71f5b98f7f353ed34a3e0c9bed219866a914181fdef936461664
Range Proof
672 bytes (Bulletproof)
Memo
3caac8c36aa082a59b7cb9af1370f9e1e64d2646ced929c63d9e03cce9378f99892b49ab3ed1ce406a67d6b1a7ab9d752c91b4e596751ced2a99cdeca8052b7c32f4289478f56b484fadc268935ba3dc8caba2927b27ad793d74575615a4a37a8fcfe17e01a85d8238999c5e26db4d3d36c0dacb4f8cb477a0ca7a0d70796733 (encrypted)