# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
142040cd6a04769aa2be1ad72eb403f55deecbaf95e602ba0d55b6133625ab78
Pseudo Output
7a53a53e04ee66e32a1e952b9b9627bd9a1e9cbf544b2bda35d9ab0a7ed2081b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
70cf683c60c830b680fcd53d23be440bf4a8aabd6392c8eb01ceae90ee56d00d
Commitment
026ccc2fbc98a76c9564c5b479a94606dff83a872bab3d6e6b9f2d8631da0d61
Range Proof
672 bytes (Bulletproof)
Memo
26246665dbad6fa8d67f82db3046ae968289f2ba67e2a0668bdaae2b161ca9fa9f21ad8fbe632ffbf44251893fbaa5c0b2d6f07d55d96e93c6fe4736026b1b0a310fcdcab53dfbcebb5a56cf0a5f0aeee6a81ac362d28b7d4b3bba0e8a4c6219a07061477c50257a31c15dd18dd266c7417f58d82230e10d9ca71ab77bc42c50 (encrypted)
Stealth Address
ea9a97ad8d0506f11c389dadf394fad5f19d9fa27117da2c6dadf62634120974
Commitment
7244b49816d2fa596e0114668b73e1674e1c276593dcadba6a41debf8881324a
Range Proof
672 bytes (Bulletproof)
Memo
f69c21ad5938af03c3f58be6c1aedcf0c7c17e69b2d4eef14cb6c80266808400f0c98d6b90c01576d70f88370c4ac4ee3f1eb90ad204cdd98b6f665a116db2b03bfa7844da43bff177ce9e0fb42c768145fc67d1f68aa887112dc574440c670de6ed220c086a79041b8605da3529a8055957f59cc7355f64967dd196ea9f89cf (encrypted)