# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7c35190a37014c0b12ec4dece52c482e7daa22794d7bf2676d86f4f8cde5d972
Pseudo Output
d257e95512257af4d405d709db45dd1fa908c21073b5b751bd34e5a1f8993160
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e21812437042e7c89adea0531a77a81fb0414b99b608e1e595cec6fa008ee070
Commitment
1a2c8eaa8d0e3c088c25e50cbeab29d03cb648845db521e539d65822da0a9a09
Range Proof
672 bytes (Bulletproof)
Memo
331f3ea9c318cf500ecf806a1b976b2ce5be1b1699558a611b813207cc7367693a1636bc4105005f21887c2fbb41f23b9b2db8ce56672fa4951eb69a76e1f816f212f68c8711d320462554ff85f15c4cdfcf7b4b581f2b384a77c52f85a9631263098a561156f0fa1a3d73d1d5b36839d8d22a14f49b867eb6479945f4ea7037 (encrypted)
Stealth Address
da9f3880e66ffead7fc004c5925e3f3c69dc7d9fa17e2e62bcfae90a5427040f
Commitment
7822a0941cde35166ced3f1d8bc36fb2094febd062dcd151b0e5693a45b2cf71
Range Proof
672 bytes (Bulletproof)
Memo
421dd51de34ea305b58c1bc79b3823de0421669dc71615ee848596fb9769421372a2a5997fb2bea168a126eecc52cfb996d8dc89d4f61ae563ace85ecfbdf4ff67acfd51ce71b307a5c37c3430dd7a1714e4acc240a428b73e805aa62785678208c52663a3d3ee62621167e349f299781f158e7c372a1a5d409df71ad300a45e (encrypted)