# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1812095535baebba5357453c80b207b242d15d31ae0885fcd84fc90d443ad048
Pseudo Output
f0d7284f91b3300795a12725f916fdc8561b26a0becb5634e1aa822dbf90e31d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d4eb7c7c00ef6eca7708cd9b99d62d7d1c54356d44b842e1616da7c09473d626
Commitment
54bc6c9163e7354a0fb703bde3acdbc1f8f61eccca7f677367aba4724c33a16a
Range Proof
672 bytes (Bulletproof)
Memo
8ba75c654e7478c2d1faf8d37a1e144a32e351d0d8aeb93513545b3f78b9d28d66c7fe6ada7bd0773eb7600d8ff2619a242f70d0a40355649015247f3e978883a865f621c2572b43430bccc985c6d45e11b33acfc26a8b6d56974fa0c483feed249bf073631c4a36555a09342c5ace28b596896a43dad3026cacc11be604dfac (encrypted)
Stealth Address
eaf6d26814da02697b4851ff22ba7846f1d715908a0eb7ec9a94666df421a540
Commitment
b6e9a79dcd5f5e421d2f26f34974257c34ad96916c6d999a23b39ac6fb216f30
Range Proof
672 bytes (Bulletproof)
Memo
2e96e0dd4a1797293152265a6c9d02f4ad050b70adbac600b344f1d944f1ae7488270dd001e2082fd9aacb532d5dc9f43f3abbd1a5ca44e3eaa256b5b63c0f35c38e23eaa40c2c0fa994d658e8cf32934ce757a58f9cf8b4af496d07f8d9144eb6e64eb871e143d01c30c4d06666a4ec71344b62c57847f244d37d3d025e499f (encrypted)