# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b4d20b27375846b977f6b9dde8fe17d8e66c70f5d4d10754f1d2e0b6cb7bfd5f
Pseudo Output
26756b6f87c4b45795567049a0e1a1bd9bc9c1c73bcf3991534a94d467b59b65
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fa94c6452910bdd284de2b7aa9910c60e105f7add703d94feb912b210fc33201
Commitment
1ea6dfb3823d546c27d123f3dd94b3cba974d96a8844f073332979e0a0781b7b
Range Proof
672 bytes (Bulletproof)
Memo
b988462c441a44a2d1c0550e13da436daaf7bc7dd56e42cc141f5059209704b69db967664ff4a807e932cd295996e52e5ed87b42096d48696a08ad296ffbc82616ca15dfa240fccac9d88d65f8ed5c07ebf0011088e87d6dce45a14ae4bc52b1c1106b9414158b1ae291c06226c0817727fa6f9e6190fbab0b29cd435ad99fb8 (encrypted)
Stealth Address
4261c0494373fb00704317dc4bf05d77ccbd09775c24fa4ab8e3344321bb1d25
Commitment
b88b44b9ee892a5b63ee009eacd11af1af3c478dfbd9717d91634a185c4ef55f
Range Proof
672 bytes (Bulletproof)
Memo
606c3a8ebdd2d92e7d2ddd27cc1eaa1ba38b38350fdf80fa80caf2e1bd9aad9b2ccb6f52e28f4d9dc53c5e3bce38040701c451cf941d301c8c10bf5c8816597aede27c46e53f00f08dc428dc595864cb16080857bd5f34aabd32374a1d466b371c2bd0c49a561e593e5cbb3d81e96ae9d9b0289d3dc2d1085e3c708513f0ebed (encrypted)