# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
00556b04d5f6ac3cd2143c9bf6ba7c7c481d33eb65bdb77baab16a720e5fd27b
Pseudo Output
d07de45d42c191e8a93f0b74eed783ab4fda01e25c918af68c09206648ef6e54
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5878f20fe357b3064834bd28e27fd7af0dd28bb98d6304a018c38418ad18893d
Commitment
2649d419401cac70ffa3959d452f3404ef7a7c5152c4264f5783949048ef8837
Range Proof
672 bytes (Bulletproof)
Memo
43a903bc9767229ae7cc588580c3bdf036d20173d0789ed5b02edae29fcf879bafa16af417c9647974c26e2167b0926c76f3b0fdd7e69bb1ff245815f2b1a27dc615d3bcbd0c6a111a79af08d7e841d842015ebfdfa61422f8510cb624cf10670c98219fd5b808295e85e97e83055a7534cdf24cde4efa212bc9282a2ddd34fe (encrypted)
Stealth Address
8450b888e4651c46551761ea04cfe857bd64f3a96646bc602e7ee68073951537
Commitment
be2bb95c4929490a441f8556e05206f717bb65c6594d5f547299dfaaf500523d
Range Proof
672 bytes (Bulletproof)
Memo
4f3598229849eaf178493b92919bc5c8c3c83a0dd1920b603488c961c4766ff5b4294c3884353dba7ab2b1a22ce4a3434b79d4d8e5479b2d4fca9e690b112a386df6ba3f5c3ede08f2a537761d52332f90a5efa370e173de68d77b0966eeff77c6d2f0208c98b8082222c9e2f591ec28d3763db1d0ffb5ebd2eb9a68c3cdb622 (encrypted)