# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4e105061336aa134061c470558201f98639d08092cdd1ff3d41e3670aa89b471
Pseudo Output
981c52715bfc7d779eac09fa512eb3c46c239e7bdaaa64e29f532fde22238359
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9082d0219d3d0e88dabc2c6f1502b322df002f003f6b073436bee3bdbb0adf7e
Commitment
16e1d2891c871bb9dfe193d408ac5fbbe103b9df0a53c006410d7515036b6f4a
Range Proof
672 bytes (Bulletproof)
Memo
b3334fd14d8ed05d518a9e34e44da3dd8c6ad247ab36d14100121d750bc2b651203c448b8856d79adb388e36c6160104492dc1a38f6d9fe68ba97769bd58a391e6eb1e45a57aec17587fc1207e7cefcb5e0f09f85986d545ef2608c03e0f0dd1be84afeb9c090d0ddbc8013affcb883772d7883a54bd27d83ab6980bb24c6e2b (encrypted)
Stealth Address
92960f47d0ecbe2457b21af7007390347613a2d93e88711cedcc555f72433108
Commitment
74d0a08f74fd12e2cb3f371ca9077b7c2eaec335346f2e93153af4c4882f0245
Range Proof
672 bytes (Bulletproof)
Memo
de397e184226866505a67aa65263e1c74e16df9f3b904ae1b9812997b08ab31f469a2cbf65a2d82309b844d4d176b0c61abf349fc622be9ba0f78a488797f0b22bd0a434478deaaec3a5aa191d30ebd840d011397e26b204bbd0dd7f3351ec5bdec6f61a6eb029b87e4f10b7007a7ed522bb5a39f0b8a287f9132ba8f894776b (encrypted)