# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
08c0ccf8243cbf8d99171ae89e00eae9f5988564eb2f4f077db2c83c0e5ba720
Pseudo Output
a8037e0d217045bb9915cba6b8e3a0a390ea275ceaaecc7db7484e0bb0ed134c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
54b22f93aa0465dbb60e3a604c5bd0417470ece410ff0155975e76e0ccd81a0e
Commitment
3eaa6a04573cd966295cba5ebe6ab44ab5d765f3db93a9b96885a51e2d03e611
Range Proof
672 bytes (Bulletproof)
Memo
f57b7803a64b9e732ad3e5459e5d7844ca1cbfe47dd18ebe95bcbb4209f4b92a83e1a1aa56977e9fab4e3264be0c54b79f567714318e9d581c504a7478f539f0ba06a6f44084d6e77a6086d0ce2e5b2436d22cbaf8c77f4256b7beda67132e54710ae4a1eb68808c2bd78111cd5d82c8062cf940306361adf458ebda58b51590 (encrypted)
Stealth Address
1a038f8de117fbcbe394218acd27319693433c49c0db6ad541ebb813c14ae006
Commitment
e4a4f2a436ee2aeb1b3acec010f6a6361029f6943827833aff709f9670ae5452
Range Proof
672 bytes (Bulletproof)
Memo
e46379876b4b044e45b49421a59e13e93a9f215b675ad8a52b338cfc8abfdaaece87f26cdc026da235acd4585404ca51c61b22e93f58f6621813822baffe7825999fd189d0158bc70b422ac61801ee55eafbcd278fea5ada7393df145df917caca76f1476035abd07eb2d5db60b7c2c00c14f94af8037ccdbec272bd1fd6132b (encrypted)