# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b68e1266ec654fcb9a9c10316baf87ce2e86c9fba767dd2a3bc590bca50bdd72
Pseudo Output
3c032e3845d191c27fb34b06779ef44a842c6c0aa6d8d007b667812197c25341
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
147c2fee856fcee5c3dd08ce5a130b7a12487c39ca919ada84f0a7b36ca28f61
Commitment
2ab1ed4af283ac417c9aa68a16becfc32c32af39286cbac2045481544bea1a22
Range Proof
672 bytes (Bulletproof)
Memo
94b0853c3b199ff1c9366c1ccefc4f72e9004706be0f8b679b154f4c44b8e6e719be15350937cfe8dd019589bb7404cddedf3eb4d8be82f7784173e16474eb7d084d2c35eb6c675c426b4e191b5ee38c5861f0af04d7b695c6ad3d0743e83e2fd322376df64f0e242930b0e9d4fbfbfb789982e0ca26aadef33384946f9a9ae0 (encrypted)
Stealth Address
1c0620ab0d46f4a852f5623337306b4f7d8ca916a45fd29537c7df91a662e835
Commitment
b4e1a9bab72aacecbda4e000fc22fb88992a438d7259c3899be37ff0fca81d15
Range Proof
672 bytes (Bulletproof)
Memo
860bcd695405e3a5dfbfb31057b1470ecd25201fedef384ead5fd56ebdcfd21f8b6b6b559b6303582b0df75496cf6faa2d1d9e125ee1c0accf97001ec1f97efe0ea0a307973cdc5d792b7d259e37d96fcfd9e0d7dea5fc5003d013d0ab6ae39b45058f3cfbb89ee6f342f8dfe881d98d5d5c768b434707e36d8a5287667e6447 (encrypted)