# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ecd7ff7b53e71c862d183c71e960e638f1415f882ab3f5e0f1ff6e8f7b909949
Pseudo Output
aacabb2f5c3b9fa47ad1420b634dfe1730cec0c4aa2de36b1a0095bbd462fd0a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
525a5390d5ca258c13f9b03b61cebd8f0b89e6be0b22ff27caa7db2c3db67014
Commitment
3a08c04e488da1b0e4b9402f3f78d09736072ef8c66f1fcacdf2bcd2ca176466
Range Proof
672 bytes (Bulletproof)
Memo
e1529265739aa094a5badb2315d08e31297ad0199da0354c8225ff19bd6593a02e377a5e3d6b4adfa6ad7965638b515e9ed95884ef607787a4dd926bb77b34f7158f0bd4299420270fc1319febc661b8f8f777fc2b11caf82f607fc064bdd6f5253492ac42d62eec5dbba6bb9a90d6fd0d84a4063511eaedcd69d08f5ad485f0 (encrypted)
Stealth Address
48d7994898114ed3c347ae79d69c2135dff65fded179e2f8a64df3c61c858316
Commitment
5e4e69cbfd88f9656f3a4429b51e3dc466d9a90b16d35ae6e1ee573d439b4279
Range Proof
672 bytes (Bulletproof)
Memo
b190ee684332c5143b69975e03dcc13c7217a44d6c138648f1d82b624ccf54835949129f79a78503968df902ebb8b27f2c91f6cfcd71e154fc1e1ce1bf5f7bb8e50809c02e2b2af83147b539cec0a14898359edbe921668aa7d8944c9f58af117c6c549dd9ab4112de44a7a6ab5020022a34cb1c014a9806e9c197e8a3af2a74 (encrypted)