# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2e4bb06d3b396f9f20ae03377536423df8b74fab883c0977690696b67405893b
Pseudo Output
3ea94b1c0c6868d5ec3a80b45a11544b19f7809442cf904ee6fdf0f73bf0ac55
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a26229c1c2dc8f3d78659732b0cc9af1863999205df886a8c2f2567eb320dd09
Commitment
1471a130ee8da79ee832560bf89c95f1cb900e45705ea62afc9741624f54a14f
Range Proof
672 bytes (Bulletproof)
Memo
e0fa281cda3806dd34846ddf71d817fc275e9e3f595d5c1f5891ac3abfc08734d622bef4dd524cd6f6adc4e07aa1ef6c1d78061b247487e9b9bbc01b5fd0f831da31ddccb0798d69bb4cb5bff2a46adeb5c80eae5cf4dba36cfb29236b539e050f3065d0187ed57748fc5f387fc5185df3521b2095a95da68601997f9613e83c (encrypted)
Stealth Address
1e1efb787fa68d266bd89a32a2018b6c0100a9256717d3fe9df668a831439f56
Commitment
604614081308e73a872fd35afc37211e049255fe39b04aad6a51e2fc03528f04
Range Proof
672 bytes (Bulletproof)
Memo
0ecefcbc6b313ae62f77c68ed6d264cad9bcd6b52a4c0de86f15940c2aa9e2c50204ad6658d0c255e20d03c129e020890e264474a59fee8157f90bea5623b8be5aa9d3089654c94b8227c51c08b4c128e4847d940d978a60fd77d6c05558d301ce2f7207a8e8539886b224d6ed81255eb819d7367e9cb54a73ef697cee2ff5f8 (encrypted)