# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b81091b3c3d3e59aec0f45d7194e27519683d4e65a1db284895e171f63798a58
Pseudo Output
fcf00da539b6ad7df93a408fc40e9703830f9fa1f0fa7e5518142a87aa00166a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1efaba9d2316167cb2d36b66ec2795711f0d7465b771c6203ec9342d416f0a2d
Commitment
b4793f5a576f524595cf310a5121e84d6aeae13d56635d5baee916315c80623e
Range Proof
672 bytes (Bulletproof)
Memo
2173489d6e9fa85c3b020cf27023eef0676ede0e6115c788a1cdb59d87d107d6183457072f7c35dca44e5f92fdb30d0e7055f87bcfac3db948c66215d3005ca4829ba5fcf13716df7be87ba2d69ec1a8bffe7296a8a6d61b1fd900241dce314122601ed573bea7789f8ce11ea45e047d7c0b4e904783f598f0f92a5185c5cc73 (encrypted)
Stealth Address
14556cf56ecde2e63919cb12e9d283ce896c31ba40141c10cbea00f08a356b09
Commitment
e667e9c076572c746efad1ef02f3ad073a4f445e1801d089304589139b098856
Range Proof
672 bytes (Bulletproof)
Memo
7ffc5b5499fa620ef2549c0bc5390b2539dff02ed9b006ea9098e4a492e062009c75d5258bceb1acfdec35a2057f8dca9d77d3270f7eeaf00696835d49713200053a19f864d0c5fd89b9d9339a711513c0d5c4cadc08361b1585b10871c6df33dee0f657dcb42bb1b1e779b911d06055eb54420872c32c0d9d3b8cde4ac1c027 (encrypted)