# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d48858ce64dd90b214484d4e646a43a410349106bf792b4eacbe6bee1dc04b33
Pseudo Output
b89d949d75beed142d9c9fd0ddad32100da79037b7a5195cc6cf6dd116fc4d42
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3478123a9132fb3e763f8c529ddc99bbc13bef8462b8f917ab8757a053b0835c
Commitment
30a5b7d16e617d3b59806e66e3fbc8bb427ffc9bb6973e1930d4c4276603eb55
Range Proof
672 bytes (Bulletproof)
Memo
f647bff89c27f021243a6de751ba5a7829a460e2278a77a10313a4a493bcafa6dd5bc30b1c18e02ed021ed8f4903662901732b2ae92bd5a71048d266d4eb664d305f187d7eb1bb84f97d54d4760c81b52820735e5123ea3a278ad437284f83f33a02942accf6d3448ac34ff2bbfbd9a99c5d194eaa074f7a779f374741f5e555 (encrypted)
Stealth Address
7e522f288714aa7bf1d95f68d808b15799d0b944900bcc4b4170137d12d33254
Commitment
72a898f34e6fc2bb5c81205d0a1c60d6f7fe1e1bd7787a7d4a520517ae192d26
Range Proof
672 bytes (Bulletproof)
Memo
8a760cb80f5edf5e16af15122b0d919835aa315b5b3a3c0cac0f05f80ac0f82aeff2cbc1f31da9df9ff6a33290cdefa61d5fec76f70bd609b89405fc6ff0067bab262906181a1d44a28658702f2fdc48af464ff240cebc3d2d259f63fea8484cfc91f37155097908b0282cc2e5df637d885c28d47e3235a5b8bf5272cd9c20c3 (encrypted)