# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5e57b580d8d360566d9f55d93de1d2aac7a204452cfa89752d287be9dc13af29
Pseudo Output
a2c9676ada0f965fe870b0e11fc8da30ed4bc2ccabd31112bf37e6a77bb5e130
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8ea230a2c8ca4f1ada725f02295cd39452f1aa07aecb9f3152ed21021284b968
Commitment
5e96b980491937fcce82d9ca64e4e95c92d1bb0f7723b95626f41d0892beab16
Range Proof
672 bytes (Bulletproof)
Memo
6a997538339e2a007f341d3e6e9714b6a4df8bdafed02951824e767ad046c58419182d0c6625c62db80347e62185c0c9b4fa69afc4baa01171feb27df4ccd1dde2d2d3f1f57780627c3d3d38ccc8bae9c4c2002b7754411f25c6c7e337fbf388e4e96f857b1b02af4a39a19fab371f4ff3c0221c2127073211d4f469cafd8b5a (encrypted)
Stealth Address
98961b418862d461be74cf2ca98b2553d142bdb3caa31a281ca294e973f73022
Commitment
540a143027e1e52dbf77533260750b99022bac2b452e86ac823021566bfd067b
Range Proof
672 bytes (Bulletproof)
Memo
a4661946978dc7e5b03689c82832dcc09a3e236ccfe250a2988744d3dd8c193f77bc157df3eebbd04749fddc9958ac1b74958c88b9fce12a8d8edb5cc663941786ab2b84e6d2a1224efafcf9c1d0ccb7a030c50ef7346e26d7ee7a610e6d03c68f0177ef483312ad5df628def3773bcebdccfcbd42e33e132ec99c5abd04c743 (encrypted)