# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8848911758a11ebea6b561ec897199560945f757d2ab7b8111e730a4f3151419
Pseudo Output
4224dd11eb0085dba077ebf5513964fd9a27cfb5c4bb19517528fd41c67e2e27
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3ef7082a21bde6a461b9c11ced8d0f6c303dbeadac18c38ebca03c8568ba690c
Commitment
6c22f1a275839bfd6bf617e6f5b657f30c1361d56c4ed30a3f93ef7efb66eb4a
Range Proof
672 bytes (Bulletproof)
Memo
35cd8db51e857929f557ebfb184358b04cadffeb94eee65af71fc617c776eafe9cd3ea4bafd643547599c906d905b07a74663630b5992f4f0ef5086ebe566344e1de84d9eb64103f86339963d7566b11fb6948f0822d105ff9f01a67deeb20299025f6786eee8d6ed81ab0f51a87e6b9c78e0bd093e244c19c6a9a759788b736 (encrypted)
Stealth Address
1ccae03e4fb8eef5f5ec97562965160fc4148aae4cf795b80ac203f8108cdd58
Commitment
eeb2082e5ff1df7fa05ca9221b2058c4d48e567d4c5bf774f3c87a407644c868
Range Proof
672 bytes (Bulletproof)
Memo
808d92d1b2c99dbd718bab2436e9ca90169c736da66354da011ca36f78419f21cf25a4c3aef7633c2caec385eb653ba1625cf1326c9bb258a8b9b3ec5b8563ae801e123f2b5af22a77cd901aa30d52d9187d21d39307da8d1acb04bcdc3a582aba8f4d62f644820cd69d71d4532ef0f284bc1a1c6ea879dbd145239bf0ed94b9 (encrypted)