# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2cf8fdf339af7829cfa4ba92df3aba74a14d94e6246de24d2d095ea511dfcd37
Pseudo Output
66398f7ebe8e726b23943f8f9fc995b8297e00639622488c297ec27de059b326
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
dce465b02837c5562d575e5f642a8d6ec2dfe8a94884b3c9abf7a5bcb9d51d47
Commitment
10c2bda3847cc46b68a64503bba5ef8b52eb5129524191f1f693158104cd9332
Range Proof
672 bytes (Bulletproof)
Memo
c2ca71e4f1dbccb87a7148d7ca59ab9a1629a92a19cfaab8625f990a49ce8b292ba68a9b78b69b6f3be7b3537f413ba1d0dbbb33a259524a0164dad9fce57f08546dbb8d74cf2f930ce7221bc171d21c7c1f82b84d62279e0b52ffd7ccba5ea3605af0787c9fe7dadd2b8090e8ed2e97d034b9a325da7b5192b0e0bc3eac2bdf (encrypted)
Stealth Address
ba71f8b3998bce4886d93064f31655945740aa3a554deca523e9fb2562272e11
Commitment
ee0a4428360ac9b65d72f2ed3cc0f5c1500ca70deddc6fff7a735d84b263056d
Range Proof
672 bytes (Bulletproof)
Memo
8dbccca0e4bff820abd5a868967ed499947d03827cc95aeffdbb9593d1ec602e7ff386dcbb8631d8c8ec7c5982e1d5a5342f674b1cdcf10caf4818b87685f61586d5003521583aec93fb6c32e707bae5f83f1ceb13c5754f73053f13675a187f8a77dd886eaf4147595f7b6dd5591fb9353be53072ec6009d7ec3b1bacd53d75 (encrypted)