# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5ab44c54ef23ef01f50a6fc0f6d73b3940fb67dea1743607c8433ce6c05bc720
Pseudo Output
266047f08741711d4bea6a12470fd71e57daafa89189cdaa780d7aa3f082624c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e0334f6471cbc7267e0d5032286fc6eb735a2b8a5020fedecdd48fff629ba11e
Commitment
94e16cb437276055554e9084e003f53086708436b4bf89da3f6219d5006ef54d
Range Proof
672 bytes (Bulletproof)
Memo
680ae76b7d2931999133a83728a1559496ebf5478092bbfd0fe9e53c68e9ed222a4ebdc4d67bda528513c22b30f7d0c8060075beac59fb06af9806fdcfc5af4f923f138d01bf936f7895a61741b484c71b514436fa19b997904ffbc9ef3b0f93dabdc44b5f377aa251260733a20a7c4fb8486218edb8421a590b4916f569a85f (encrypted)
Stealth Address
622e59ec280adaeadc850fc7c2199880755d5112b89b3a473a1e5a6ed2d3ab43
Commitment
42b98c34ad1947089cc291d05c6e522bfea711cf4bc75aab0c98d7f0aa680a4d
Range Proof
672 bytes (Bulletproof)
Memo
15be9652dc72e3e34eed084a9161fe238c3ab09aabfa4a7f0d32b99c062f0ec8cacba2ba884966cce013257472898366fb2c5ae48084b44ac4fec85c07c94c590746336428c7900f19e43aa9cc6b257742af2d6817a8761638cf28b7af04275ab10dee1d92f520f33be13fb2d6ebebb39bfe84e8079a2295c463ff7eceb190ec (encrypted)