# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
682c78f3db3c59a05b9617fee2ad67e272b5aa0e56e23c1047f9a8934bd72d43
Pseudo Output
f6c9b46bce65ee2c0f6f9938b7cc68f9412009c17fe7f6852026ed1b7f391c74
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7421a576d03e9a87e4da4fa31aae4b185c60a42d744ea57a282bf4ec9e662877
Commitment
dedf63f4659ba52943132e9fdfeb7e62a8043d488553b11c74033ff23a6f3174
Range Proof
672 bytes (Bulletproof)
Memo
00f5fba9a022fc644c00cb22c8e540a933badab6c970fc92d507d04d7d1ce985e666dfb62d947b68b824d4137ae60d87a8ecc70759fa095c6057097398df9cf17ac78d7d16660618d122bf142d397e8cd152e2465d268837ff05e14857e1625e0585b1467b84c523df3d28330b90c152dafbcec1cc1f744630c749368032694a (encrypted)
Stealth Address
945ae92739a43ed010fee75cd32abab7af493c349343f3f26b75a87ba1bf5057
Commitment
5627351baa50b01090c69048c0048a5cd36d4bdd1ffd3056be61f697f87dc059
Range Proof
672 bytes (Bulletproof)
Memo
7cbe048aacb2eec6d6f2db2c84995bcbb185e62a8e7ef150136d0c911da7ba0797209fe2d95c14f169d9aa307715c492f2eeb6fca54e9ef385ec58fe18d8d1c714d986e8a7bf562df06726427c6f4c77d3fa38bef40294e6ddde209b6af7c2ea29bf5e7b833f60cb8725319949705a39a087af505698d3ab3381f634dd5eac95 (encrypted)