# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3cb48a4413d75fa7d8a72b4d521aef7de5a98294e4852ff292375c50ff48a667
Pseudo Output
22d3b59c82661baf98f37f721ecfc09d71e23b6224951299587ba19c35d5af30
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0019bc98978c4beda2c738d1c8e617611b304bc65162ef1d3e52248b9330323a
Commitment
40a666c27532ed013f30cab220654bbd0ae7bed74a6a08f802b9bc4d6f11c85e
Range Proof
672 bytes (Bulletproof)
Memo
2458fdc82e4e6c924ca6502a46246253074f749f39cddc4a292878de0ec6ffc5d74bba3f784da95ca6dfcb9505cb237d34eb58354ee9e26f552f5617b6457861fb76a56dfe2f771e21e6412726387e163910c04fc3b0ff6685c3b8702c5f4861069075e33f161678d7820b17ba89f0b66b118ce808e797dc621bbfb82e49736f (encrypted)
Stealth Address
c4e6062dd906437254cbe2ca9dd7af43611461f867f4bb9759463e2783766e12
Commitment
82c27c7f86e1ed3b2bf09424d4b92ce093c294830d63e5c6921d6b6f0ff2ec56
Range Proof
672 bytes (Bulletproof)
Memo
07f50ee2bc0c0d0a8d3be1c87d13cb8a3e6752fe98a7d1f675e9e6313cff1a624e459c9fb990d3d7b9755098bacd9055e77e01642b54705ae233180e7c7b016eba24f2399688bf442c6e64be0561d2967a57a393fd9860471fc97a25dac59f80444055b3c8a2119e5ba9d1709ab670046492a19dc75840fb44d6a587f41c0b96 (encrypted)