# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
045b8f506d4f78e90dd125d27ea350d732a1da3b6b0f962e8007d84ff1604136
Pseudo Output
e668d746a1a3cad4c2e31088c34a5183ba9cd3fc0589ce2babe4e995eb280f47
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f821aae16e544c60a3c92efd7130c84cbf08de56cc9369670237f20f84f48a7b
Commitment
48075cb300b548162f48cf19d6e3910e81eb5218805e48be14e68c9a0e978717
Range Proof
672 bytes (Bulletproof)
Memo
7367e71e4684dec867d0c9438ef5f01ed91f8b069490fb211aa877a00fd97e6d73d56d91f7b6a36e035d55436fd8694d55d801c9c6968ee368f171db271e3946b0cc0397c116c7eaec73f181faf20aa2d3ddc6448fa39905833e2a05c130635996c3c112fdeec0f232657d694bfdd434248bafaf37f25863bc32e170fe646e97 (encrypted)
Stealth Address
bca92ce274f817988cb203fb2446b570feff7e1236a5a79f9aa82975f3af3830
Commitment
4ad8a3020c1d0c0b86725743b5bce157300fd525de99ced331f228471ad1d36a
Range Proof
672 bytes (Bulletproof)
Memo
ac4affd1f1ac581f02466ba87c569ebe58297df7f77731a4831f3cf92e279204e507b210cc9f6125feb1a4b17514687771169bcbd4a8eb80823d0c28f18bd0302dab5f7738f19f4d7d8eef3de157fed9af23ae8d072d20917182c7c2d474301b8c0f710179a0787d58de51b76940d71cf9c05307c6405fdfcecb643681b5450f (encrypted)