# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a618426e6372a54094c40c3b3ac4e5cbe2ddcd813104a3e61015ac881da1cf60
Pseudo Output
2ca34734dd5b2da2eb7ce6cba1723cd128a7b8e58b05e16052d74e3394bc1265
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
74a7c2a74efc25005a252f2d145a0bb9f9eb134b7782aff8cc762bb441b26a7c
Commitment
6eba2d12006e713c604a1d5ac0252261dcb32f7197dda2cdf18a72a6aca2fc26
Range Proof
672 bytes (Bulletproof)
Memo
275f6bb32451b891dc64a8d8d75a61dbbb4069e61db8a24ea7506eb8ad9c9b93c99921cca3229d5c8e4e23b26f130228acbb67a8be74baacd7deaef5169f60b13afd56b99ccefdecd7e71b48a962edb48e8f7453fb9e9a7a38f1be1cdc339bb53511923bd92c39e4d2ffb4999c3f30693ae4e2076723045df5f0d5d3a4980ed6 (encrypted)
Stealth Address
fc103b744cc006444796f48d2c3629cb965e80aac73377f95bc447f72c994a24
Commitment
c0c35cd4b7b6bfb3af479a3ac882d6eaac3fad4026a1e3e61d0e7a9b7199844a
Range Proof
672 bytes (Bulletproof)
Memo
c97e5c0d04a656ba3a37105be45a64b1c311a98ec417e269dfd2f6d142741db5db26c8f22dface5764b2529a241cf7745043b3729aac6a952dba0b0f026063efba498867375d4b5783920ccfb755b94225d311494c251b41c6b71a08f667d67d248e6cbce9788f3379657a59927bd9bc84be82c20409df87ff1c775cd02f7f90 (encrypted)