# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ce69d6c56baa6905a0c0267572c2d659f32367a15cac85c57106f49ec321dc41
Pseudo Output
0253dcd7d9e76ddfc4ad4efe59ee4deda6ed65bfadfe16fac4ee3bf52e759556
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f802f921204aac750dee73a14d90e9652e8341a3d12f8fbad1e39a5c21291078
Commitment
d4492622c50cd191ab1d786f8188f7543e448517a6c32b1fef3ec441f468fe6f
Range Proof
672 bytes (Bulletproof)
Memo
3626b1e9d3f740e2486596b5683e3f63674a962e6acd7bb92d33b2647d85888cbb63732d994184ecc564288df054e684b9644de3ba556ceae5f1942ee5c3bd6e818fd47f44d90d7b627cb6b00f139926d1b51b2df0fe5228c52d6870b1052c13bb83c25d87170c092ddaa5705be550e4477df3f67e7be09f986c9e7affb6276e (encrypted)
Stealth Address
284bef0cd37e7bee177dfdd451d0f6dee2aeaf44895c88bd8734470df00db317
Commitment
b01ec59506cc667fab8f4d74941a292bbc2515d90fad1adb167752dd74399c35
Range Proof
672 bytes (Bulletproof)
Memo
fc48e7b7a415d2623c483091f152e3c6f9fc2438580f4d5805b5e1bc3201224392dbbb5e5898d7e21d27c0444839abb532212efdf4c6b6dd46e6d058c3ed98b6a124c0d247a0c9eb7a9b99c0c91b95b9f0b212714e029c45427afae6241b35f7dcec4a48633975c7240174b168fa70c57e16365d305629495064b223b8423b6b (encrypted)