# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f0254ccc76918af15404c11357a8628872e1d5d1845a5502406807c1e806207e
Pseudo Output
a65824dd1d8aae89315f6fb6d543d0c2ede0766c73b785bcb3b2f21420877805
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
503457c5b182d7efae14faa02cae91d7e16602c2874d3cefb13bc68e0f98b375
Commitment
38010277fc992044f57dc26d0799e2193c192b3b9defa0ee58fa0f04eb56d009
Range Proof
672 bytes (Bulletproof)
Memo
f06215a15f56cfbfb094da90c43d7965da8ee3a99d027998ad5e006c02c5da429070650b10095d6725477e3b12d873bfafe1563a92f648e530d4af56c7489e05b5c411f82abea4fa80cd3ab765c861c62e8a07bffd5b472323d0c65903f2a4f9ae015a84fc4ff373f86d28d8656ff4b6048a485fee14a79b056b3ee7375657cd (encrypted)
Stealth Address
4804cef100d4f951cfc3cd808f3a405296c2b356f8d2d2af186c98c4fe0fa157
Commitment
a83372ab0912e6b5f5fbff2bdea3bdcef14528e462f1ab152d35e1d87d417333
Range Proof
672 bytes (Bulletproof)
Memo
eb5125c49cdbc862dd678835d68edb1923db436314eb34cee5318b2ea912340dcb5490fc878a53b385c18da161c68902b505256db0044f72c7cd57a7c505b4603907a4383dc842e5e7c650165f44d52ce6c402f775dd89783de2ab0c496c96f45846efb2819a19d5c1cf2873c61ca1bb05ac428954b5b3c123475b153ad111ce (encrypted)