# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fe4360670b896c1e55f8750d8e152c63a394f32ac1e3ab9978e78c2499b66817
Pseudo Output
c851350b30bb3d8d2a36e7c482ebb96db5bc2bbda162140a60bc9e3050307f33
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b88aabcf0a3e7ab1fd09b85056fd5f3c42c5b3d27d8cf9c6c63e22dca9ac3252
Commitment
34e4430e39c27669e0cdd9cd35fcabcf5c34c4e58026b82f423e529ae4567e5c
Range Proof
672 bytes (Bulletproof)
Memo
76d1e26916bd08775f335098870074026123f00ed8d504702927bcb0dd76f6119a73d8e18734271390c5a29b71d526b04fd3e203f474ec02caf41d3e5e38bdafc45f85dc95414e38885fb9e33ada21b3696ef38b9463f2ae7ea9502f2e5a9db4f920e87ac4b3f299b244545d2f352acd8e76975c2ed0cea41e43fc00c33ea9ca (encrypted)
Stealth Address
fe3227044d0bab4fcebf6d51a312473d5dae959ccb0327b95e2fd9fe9b4c8338
Commitment
28ef93beba1b7004920e7639b5c2d7544717a5a2c2bdeb656371d4dc5f81dc3c
Range Proof
672 bytes (Bulletproof)
Memo
c273cc6a977c3d0b21f7b954582e25647b35eae60b61be4ccf674979200396b19daa8898903b2f419d6801ac08a64eefa0504ddc480acf94d1331a2fcf4a545455d2dc918c032670401000d618b9ada24c8d54498a08baa36283ee603b5820acd86195a30e785acbb0a96e7057fb090f780c9fd1315e84933d990a7b1de7a941 (encrypted)