# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
70ed0010855d6a9c190e77c39f8d7088099b4b0fac9c8c688b75c4de4dec9d15
Pseudo Output
0e9a413b69f5de47a6b3cd4ce28b6c703c72559d4c92b50f6bb339d38088e96f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
589286be9f6778ccb9fbcd1011664194478f6e0366fee42542646df930d97607
Commitment
e4849c5ae0371b1c673d3395fcdc0ddb6bc3a6e64029b8ea71a6f38a78c4ec5c
Range Proof
672 bytes (Bulletproof)
Memo
a2d514710317411ca0564f40d48dccbefe48da5f48852849f6183e7514a172e8d33728e028b63ceea1628c14a375cf039385e48a7cd6fd2d843838910121876f0bf45b72633a61a0f600a0ef70821a63860044c1b663a4478d884e750dbfc3b49b481a38afb7278ee3c7108bdba2b974e3370f3da0e2bf6090b63a8cef90b24d (encrypted)
Stealth Address
a63e245a3d1d724bfdc84647a1ffca77227a10f416e397075dde4e5bd2907a2d
Commitment
5427f02b7029bc260ad7d6f0e5047b98257ed18bde18ccdadda75b045fc82f7d
Range Proof
672 bytes (Bulletproof)
Memo
4603b9ef15cf27dfaa0516893fd8e372d92227e72fa841b495e5442b41cf467b02e62eecf28dc79871f6e84188169b72c2cd23a56c819c60ee86e82be3f58aa8678504d591159ef465edca8b2942c3b55a640e2d24f94fb58de2d5c8f1166ec0aa55ddfa95bb1d1d3211ddf307a3fd1dd990669a816ddd82204777e9bfb2a971 (encrypted)