# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
dab2d1dc62882c554c059f8679505387ffaab8834e65ba8e2faf13e00df4a01c
Pseudo Output
20993fe09d7d41ca97f82e393ba9a7ba8248b26bb17d35252ab0bc86eebfc503
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
82e5ad2e46c2e7d26e18908057474e0e68d7f555723eaded4c047a54cdd7277c
Commitment
f2f4a3dc7daaee1ec7a50ef96c6dafda2483b3b4f1db3272f3dcefe7c4bb987b
Range Proof
672 bytes (Bulletproof)
Memo
a00cdd9dedf6721e8a72243762ca676e1c48c58e479a7389644ae124ef830989c82bf5f4f7963840034ab659e2e00b27cbea60f30a63919c4d57d84ea6b3e19d3acf8ec5aa24c5801208e7a2295c0aa9098ed604ef8362d07c2b81b5c5d61a1c8db2403e7a0a81a5367db5ad9131f407abad765118508b2c95b6d0e705188756 (encrypted)
Stealth Address
0cdd577cee47f82bd235875b37cf517eb4664b4536bf3a2dfd8447735578b974
Commitment
a651d30b618179dac593336eff490a353d7589f08e14d09f9ac075db42099a21
Range Proof
672 bytes (Bulletproof)
Memo
8e3ccb2ce8204936cca3826149179546f5fb979099e9b8e9f6d704dd990a0badbd139daa60aa3a66c897ce65eec3dee50e751c1fc4d5a2040ef451d279d9473fb2ae091c1a8c38796d3212d373119517cc7af5df00414428a39eb47aa318320ed408380031702441227aa67d14487f4088c1a5d49c8871d8b0d06e2317bace07 (encrypted)