# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
829e56b965274c2c2e5d253dcbe0463133b7211987d9d77b7b587559b37ada49
Pseudo Output
f66a30d711a22d4eecf106c42f428aa01a1ec879fb5143a59c4b4ad5d4f4fe33
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5ecec4cf0a83ea1ddda8ebde5335789a8d810cd2bc81761035aaa8105e465d0e
Commitment
70d7e25cf4c874a86ae789e7bbe83688dfaf58a5c62b482264bd35440d1f0a7f
Range Proof
672 bytes (Bulletproof)
Memo
b8121354577d54ae76f3246f915a4da37baa16555450f6c6ac9042ff303cb58a76e1a30fbdd2f5259cb2ce0071932912b5ecc018b1114903e65b3fe04823d79f06ca27320d8ee591e3cfc49c20344d73a54b7742e3f528ca01178efcd70bb8d73d6487f8b5081e1051c54bf2755fc7892a40deb8912ba1f916b28bcc92377783 (encrypted)
Stealth Address
c847876c34b84f53d2a5a504e53ba488a181103e8785be061410f3c9f6d2fa1d
Commitment
504d51c6426a3bb3951b24bbba47ce305503332dcf05edbba25d013bf41ec337
Range Proof
672 bytes (Bulletproof)
Memo
ec6bacca13a05464023dee87070e17d080638ae5444e151b146d0536db3d38e4df3e77d16441b252c2b2fffbf37a86a16c4bb893a786037157e2d142fd7ed8c603797863477c91bed1c1d5258f1e1cfe90e0cd00f86e44c3095c78b35e472d40e07cc922a05dab088f3eaf92a3cee32a5bea4cf8b444110816f64c0697d9d1f9 (encrypted)