# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
96adeb1e1d636ebafd547084e63a166f55ca24e28aa51b1aee1cf44680aa5c34
Pseudo Output
6ecd6c5e2ae3ce29c733188f39ad336329f2bb284d7b2689c5311be7226bbc4d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8256ec0f4267b86176216e2e73c96187bc031923b70c6c43488c2ad8983f6355
Commitment
38801afef8496979c4868de39641a49e739e7fb3b6eae34bec82c06c99de2959
Range Proof
672 bytes (Bulletproof)
Memo
4a91563f2bead343fd59b9df74c54ab8c10ffaa38c68f7adc03207350a65ddb335438303a434ea4245c0495f561fa08cb83adc4f6f91022415b5ed6710b297ca812c3c2a78aaa08f61edfbfbb7fdd2ae2b37cb8b4a943966d49ebf3df083d0eddbfea05b9bbcfefb9cbcd05068955d3f1318bb51411e80c802322725737f2a16 (encrypted)
Stealth Address
0ee68eac750a481ce44a035720c9a31ef4b25a3ac47b35c26b3f62fc9b7a4145
Commitment
423d15e50e6e54e2e49382858f91d2cc1b39573569aefb4e2b93e8ec84207473
Range Proof
672 bytes (Bulletproof)
Memo
b83a62a66a73417cecefcbae704e4a33bb09c6d3b07b69269bcdbee1e4cebf6aa6aecb91092df096a031f121b45e970f1777068d601301d73bf5fa8dca15cf1016772ebf9c0b983936e01d78cc88550ec7ea9c41d3b369a1e027a9de3e5b023a4e873abe6a36dc0b41613ddc3d631092e5bd9b0f1f22caae8aba9fe482ade3bf (encrypted)