# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
58e9b4f6146892d695d899bbf8cd97489e7e6860617438a8c07ea7d6de1c9f7a
Pseudo Output
decffb69927fde017a02f85b562c96855299720f48a02cb1ddccf4e7a99e7721
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3801c232c31b3eb013131048cb01005291d193bf49910add7c08e67a6ed6b967
Commitment
942f997f8fe7ef8083070d870bed6c43c06245884ff567cc7eebb640fe7b793c
Range Proof
672 bytes (Bulletproof)
Memo
42640265b9f9cb53ac8163fd8f3c01653f9ff8c584c0ae981a590667782eda6af64a0e0240e156595aad683a53ada822df6ebdd9a6fe5c7d4950ea56780e87beba37a8df45a56c1119c0194705be5dcd48f5f2df8d16062079caf8a7de5c8622dc984abe872514406eed96eb5c4419ac59d17259710ac0dd57a48dec7c82fbec (encrypted)
Stealth Address
2e3c1e99d38f1c62b9985779b1c8887a40a3e887c013e2f16c5a1b74717ea253
Commitment
8a45623bb29863a909f9f5367c7c4120c19308ab18bfb6894120dab8bd951c09
Range Proof
672 bytes (Bulletproof)
Memo
821bcc0d764396706654c2dda11ccdbc52549d744aa006ebb7cebc956f67cb4b9fa5e64e150854492c9df32e0a5122b20a13f0e9dc3a401eb8fc64436aa10ec22e166a5cb570cfac618f979e9ed4fc3add6078ef769780dc18dab4aea3fb7e2ff2907c907d313ca5eb33ac3e684482dc21122a0d2303fa7ed4c10c9cf98b9212 (encrypted)