# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c2aa6c5523d7d7b1a410806b258f22472499ab9113d0608ae77c876b58f55962
Pseudo Output
26e4c0ab50787bf0d3ab538656edba1ae557b7184475725ff70125d7b5698e70
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3a153c82250a5a3a4a1b54f078f1979f09b032098589e9448bf8efb9f13e4d51
Commitment
9e1bf190f83a40b05c075d6f7852860e11e64174e03a1c9698b96b469b11c160
Range Proof
672 bytes (Bulletproof)
Memo
869745c9dc4d0fb126c9e13def0a1564255576df08e1e850e781317bf44ff7de09e714079653d52195fc7f408f69bddd22133cde40b40b797dce07d6abf11e31c28a5924e58fb3a376de5075da537c87836c2f1f6e4f5b64efc27b5c83481143a213ca5a9cf93f2b6a1bf0b86094b1efc403242eb3f229f2fef9d50b2f7ffeaf (encrypted)
Stealth Address
bc9bd650ce83e2888fe63dd3c0cc67898ceec1a7a899d69594ab2fd28b1cb945
Commitment
d8b35f08af289294b1a46bbbf3b25892b8ace760b3abb5b542802a493146c53b
Range Proof
672 bytes (Bulletproof)
Memo
ffe081e42fb243f1321aaf17e0106f83c984760c4ff79ed64feb5d6cc25a285e2c8689472450f95e10ed80dbd8dd734faa841298aac2257271528f09e3914f2b3ce02b5d57c7792ab8452913684307a09bf803e5d5b00925fdd772a4b9a5ace8895ab64827783cea1af2d5526be753048b24a6ab4642ff85b1fc37bb2f192bf0 (encrypted)