# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4689e0c9dc400e40285c913afed3a1f76dc3807649cc60a5a241fded52aba669
Pseudo Output
2e6722dc229daa894698203e7e9519494dd525825445bb95babb6decf5794f45
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
70b83b2cd72df49e2d1536e79c704803d9afed21259e1e3e914b328d2d1efa48
Commitment
169d9e49d82dabdb32debe0aa94c862509765ba39478835393cb02dd15d9a361
Range Proof
672 bytes (Bulletproof)
Memo
88b5ae8f92a55e7b23c5775101bff76fc0c902406d1912cd4c77a9e7a9d71dd46e6abd3d7a184b884fa7606564c3d4964e84b44abcf8f214979db7ee3a49a1707c85cab0e7d5af6d6d0b62b51793e05e3e0aaa85a1c6837d29a51c8c9d68ba892ceeafbf2c732c21ca0bf7f8d01dbf1acf556c0d2ce76c2bb090cd95da026289 (encrypted)
Stealth Address
6408717d733dba5a10f42fdd56968a54cf9746813653d671ffad570f4d351918
Commitment
d6f864e8ce9db396f78c7953cc3c021e6fa3add8ad5383adab65272d3cfa9e56
Range Proof
672 bytes (Bulletproof)
Memo
f50dd60156481b804d65ef7645f160b17da6151e650062c3ee93889d62a11b921b4c73d9662b745d3f9f246cae977ec4c7c0fd1c418d92b9970f1980b119a4b583d4a8455778e22c1e785cb65d1e1b510a0e06084635dc1c55c6b6ed2475d8c30000dd04f6df6381af6327df96c715fcc2bd6faed6b536bb1c33d8d48090404b (encrypted)