# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
82b2164f26a999bfdd0a9ef0675bb2fbbe139eb38ee6313077106725209dc763
Pseudo Output
bcd9526277855c90eea3ef0170d5e75fea698859b78a77a21fa09a6d7c11e96d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b63ad3ebf2747d0af9db16f9ed9975778796b3e9ead7093c764af5307039451f
Commitment
da7937ee781328b79c488e0b4016cc0edb4068e6fefa519d29812d04fe43f052
Range Proof
672 bytes (Bulletproof)
Memo
044fb8cbb89f17e41b1cc6f7eca00d7b52a54824b99d76b2822c09630e3d8d2e1d37278095704ed25c129e3a000f0f73880d2b7454c448f0376a4f5a374bf8beb9824b421ccac833b11eb2565f2bedce4270e9a1e38a0e4e4584a60ad4732d77c05a3a4b3245a3a6d5f2e62423368e8cb9a45c9a31b6635c0459e5a0917e16cd (encrypted)
Stealth Address
1e812f9cccf5c42a4e07f51c498db5d2b5a6b51970c16359f694851424553f34
Commitment
e2534ed959b8c30ff773207a5c8c4f23e98d0b0f583bc57ebb8f9c624aba884a
Range Proof
672 bytes (Bulletproof)
Memo
c804c8a24bff89bb7c31be7efaed612b2996916e3e1c106a4194f8811ad5e99aecb8e420443c2affab3f29994d2fb8eb901108705618ad90df49b41adb462a8303b3cccdd2f4a98a5069cd10189f86a26caf82874b99ef92e43fae6dfda83b0062c293de1725f3603c733af97a2e1799391e65d390b94fb58a7d642db90ad05b (encrypted)