# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f6a02942a30f07a1a157dfade2645f311dae81aaeac9c6c57b01662d0616f162
Pseudo Output
d4e9945977ab0f82e384a1eef33437e544819506969f4eda90f3ccae6f9da222
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
30326b6babe36df64adecbfc29cd2c41ed676de59b76d69d1d6ac9728cbcc05f
Commitment
7e6b75ddd077e6499f822230a4248c7b93fc1f45c4e430c58946f9be283f2802
Range Proof
672 bytes (Bulletproof)
Memo
8fe43f4e77ab74ec0da6c093d6f0bc376456f01596b5abcb5defd4dafe4bcf27bfecf50b3a12f78ddd54038396f668d326b04980b0ffe0e0ae2d5dde35c74178742f791dc1c2f8eecd7e4bf8214c31fe3ba452872483196698ca2affc1d17abf053de9e0d04b4074ac56a3b3210b4a7ef7297811ac0437acdbe7c8ec79e0f8ee (encrypted)
Stealth Address
aae990f0f89ef68b02abd367809b0d07ccc97884eab8577211fac382acb34712
Commitment
64d98b95ae3438e814ae2f7b0e4d42376dcf4859683d27c00371c1a0961f2955
Range Proof
672 bytes (Bulletproof)
Memo
b8bc5c055c3781711896e21104371505148b08ae68be512fe23b1761a717fc71639a3377aed12b6e386ad4bbeba9473331b1ff972472b8fd9411a035cf3d00d96300df8f1aa1176b383e2449a915af14a4fe9cf6f5a01643ae8c4a6989b9decedc70260ab714c0314cded8e14c7ff5c2eb25d4fd90c143b5ab338906a3f65473 (encrypted)