# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e07ef8e1f54e8ad4cacc5cd849b4b52341e4eb635b06f5189c63c917f3e3212b
Pseudo Output
7405f35a85171ccf1a3d95044fc1d173861a1fdcad8eb7d9420352bc34f5c012
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f47437b4342cde560d2d5748e56b74505bd6b12eca114bbb570d0d8d50982752
Commitment
2cfe1f142f4f73455c588b675dc331be95b91a8c1e525cd03c445fd8e652260f
Range Proof
672 bytes (Bulletproof)
Memo
e47c7ea20a96eeb62cb498aaa7dd636b4d054016d556a0c5b973467fe00d009ceb59f977a91371ac623cbc8f7bc8d872658c2a4f723b72022f07726a5e7224b311d136ff5167589d483d3b4bd24018b1890257414debe793c4f323ca6d03814dd682eaf34591e53e827921457390a1aaa37ead68d12e92e09714db983b915b5c (encrypted)
Stealth Address
d88212d1428fb28b80562fb800eb8b5fafe289cdf1edf0e6d1ba207e90a56c79
Commitment
d013ad85692cacbe6e9ac03d71b62079f12f7a86f53f1a569a2c410b2d4e3e44
Range Proof
672 bytes (Bulletproof)
Memo
728f3e5864938a221a45d34647bfc186cf8e19bd59be3104f4bd20818dac3f1588b54493d60b8aa30556521badeff8878e020463532e0e739be2982adac3c4349666479504d68cdb774b81979090779813706e18fa84af677c629d05289e6fe21b1598f40c2c8f82b1ffb49d19aea639db3eb861b7013149ad9032f9dfb82501 (encrypted)