# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
728bd7fee258566f4da10290106327e1a9bbee196f4d2be22f22d6d1ac08ea22
Pseudo Output
74d7a6fd3443bfa1cdc8680bb4ca86449c263c826f2c0df5cdfa5153afe2f14b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c214e30fd2d9826bb093e31e0ead3dcc70c2ed7812f04cfa3d8493da2f717d62
Commitment
badba3b1f97acf6a4268f8ad10b41ed3a202a4f50a93ef781dd0da29306eea03
Range Proof
672 bytes (Bulletproof)
Memo
8c4d88c84c5e6333dcb38fd1dfad247ef423fd649dddef0d0de6da9fbc45961ac12d2e37a74494bff5e8df253fccc47316a4d570980fe3ec8f74b7be6e28cf68103e93cc87ffb119741181d30b736151e242b4bd0cabba50f67d757f13dd20174a315267063490c7293774ebe5ee12a5410f5d3d66c0e240d1877fc6bd747e3a (encrypted)
Stealth Address
fcb9bbdacac5ea4c6cddf6616d00d6233b10536dcdb513f564b93c07ceac0364
Commitment
40ec7caae5f53f904129c81de5b4245c80b74f20ea96ddd32ee22d4875178229
Range Proof
672 bytes (Bulletproof)
Memo
df25f86b3163b21383357c34a8f35765fb882ee38f49ff610ef80c69fcf4ebf33c625e211e0fe0ce879b4ff4c04763b5f675756516167f7bdb9c98e222dd2410e1b553a6a32915aaa36000b214d879a5f12e0b8e3234bd251e7dd2e8a3a64b94e15789d828594f2da8c83d4aa076e715d4b5728596c18232c60d558e2378a7fd (encrypted)