# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3a2fd2582b751f69ea9dab3537fccf6d926641eedb3a199d72ef0419b4da770d
Pseudo Output
a01fce4a4126f45227299d1263d8171dbef60741a45e3752f7b97c7042fc2826
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0e8aff01b7145ba13a9daff25a22a70f92eedeaa06f40471977750b979e24578
Commitment
a4068281ad1544e647a96de6e63345cb732a4f1130c86f4ea560b89cf9019a68
Range Proof
672 bytes (Bulletproof)
Memo
9b26a21b0526955fb18fc95d87dee3c21b5b4d0a154ae6f520ccb41baf737b37becd08c94eb50d06ac8e8d5f4cc4cae9552d5378c502d35d8286ac6e76d4d5645038c6126c002668afd4bb43bd7a19daabc8139ecb036bb4d24a065bccb1ee987ffea9d1d0aac602dcfb15f48fbdc8b9d719724b5738a17cfc805add894ed225 (encrypted)
Stealth Address
ce4893a4e4dadbfe5872c63f94b8322db448c2b44d9febd8d55fc8e9fa73321b
Commitment
e6a9935bdc84ed6a5de2207deb70385e106bfde57d6eb99e8d3dadf5a355fa69
Range Proof
672 bytes (Bulletproof)
Memo
70c2f8577b6bc484639518810c9a3af97afc8509f8e7e53375efc80f89d1efa34b38e0f8085491d7b855109c17834c23bda0a635cd11efcbb1a2b47e06b508d9eeea41f27abe2ce47d3134b8eb03cc4d88d74491ed79eca7809e768ec5fb8f74259d362cc5a6eeedc94c3aa44e610fd37cad72113f36d2192fe2448b969eb9f8 (encrypted)