# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0a9bb59474451e6be19439e8a6b9b3a322510528f091bb30a1433559b5a42158
Pseudo Output
d46703a2208a59de800a24b42b54cc87e13e4fbf3bcfa4f1e36df4ee2c86747f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2e7462058a20cdd8f1505890f259768200fd1451be8170a0f3fa4db10c3b9f31
Commitment
441064fe834c5732fe6f1d26174e11b4e9da1d53f619308dc103cba07ac9b82d
Range Proof
672 bytes (Bulletproof)
Memo
33067e23136070c297ef15cb994ce5ec4b7eacaedc0a94eefe37f83cdfc7d0cb99491300a886a7d1aa86f361bb5f9523f418a3b78d99967d2c93e41211bfd86d059d7feba47688e16979946441acf8b192d11bae04bb4747a787d285093bd385d30facac612293677947d480b517b5d0e7e6b8d2c171142a608ac964af61a896 (encrypted)
Stealth Address
ee20efa842f63a06e9a3188e0be38c32c600a9ffe465340b81fd4db580cf495f
Commitment
90f67952d538985fdd7a0978ea1fbf354f1aec00afe7f833f13a03a61458345c
Range Proof
672 bytes (Bulletproof)
Memo
fcd825e22fdcfcb30b69dd34065c42cf006c1b092d4a262e522f05725d870af0066beec5f9432b14eaa615c3c7c930faff36a8732bb130088531510bc3f5989ceb285dbac2ca1b63dfa4b9479cb99cfd3f47638bb8cecd38224ae5996d69b9ec7ce7649081f3634dd0edabf8c62b84fb9f57d91187da19d4b2ac182e72bd72d1 (encrypted)