# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
74872108229a6c9ae995996e3ec42e9a54da91afdad298a3f2271e477ea58b03
Pseudo Output
9098b447a065f941692b1889320f13fa8dd716669a5f7f285b676aadff50ec33
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
94869d9742d39b54945f1cb6151eb1b6c362e6d94d79963cc4635cc591ce412f
Commitment
d6a181659676ff60c79f28e80b522b8216451b2de030a88bb92526ccb3263a3d
Range Proof
672 bytes (Bulletproof)
Memo
55c2f5a65eac335174b23e97f0083135a1c4a45e05c4e0b041d596865d6fa5903c5054954b94624a2323169cb43aab7b573d960a80870dd6da3bfd97c13616ae0b4219001de310ff10ff6e50025fe0232d98e33e3d8de580def62d8d33247ed19e007924e3b8a76f504cd6fac42074377b8c6a6686cdebcd03ebf3a8643a4169 (encrypted)
Stealth Address
76bec38c296afaada80272873a15608720dd267e9759345e51c5cd7727c2c755
Commitment
248ea780ba1dea56cf31173d91e80d25f79edadcca454c7a8d95363c89eb0640
Range Proof
672 bytes (Bulletproof)
Memo
b6af1928b3cc86f3d1cc18914ee46c1d1906499610ba05857d820efeb7077ef27c2a64e273f3fbbf21b10332b2f2dc126d6d67281fea457065c57e45046d666d2ceb6d278872307e6e354421e5b744204aaa42bfdcea709e671d3b161e9441b6bf16fcb0639660136d573dbbcd81e53f29203a4a6735f7be60c3425d951b1c8f (encrypted)