# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
92d9496f8d7d4511476a44927558240ca7fe9f7749b2545441418360ad29632c
Pseudo Output
2a9fbcc20c48214991408d5aaa94c0f30acc7bd0884d7b22f3f5196e2df1ef15
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fcdb89636456d87d8445e3467ef0ee3db0ec510f3a668e0ef24661017ee9fa4c
Commitment
82015d4f5dd9818ccebf0253060dac498936bdce80d7cd1b5c7f9b93ee4c1f78
Range Proof
672 bytes (Bulletproof)
Memo
2c93411cd7c371262eb8c894f0917b5c5b48719cdf8c938c5a9c8507c6eecd6687a1ffebc76872b71a4a4fb238db4b332bdedf11897cbf8b77fac1399a9ae6d1fbc2b87841b632252324280c846b2cd22e0678a56d7520a4a74452de212fed0d2e779b516d4945e5e81e9c95bd423c3c54f0b58a42094054b3adaf942e4293c6 (encrypted)
Stealth Address
943ad4a23bf6084573480e1a481c8b568688e488a113013112c1ba8687510015
Commitment
2edbf77a02a612c8d9b0143efc82e2878fd0b15d60edfb858e699b7508a1071f
Range Proof
672 bytes (Bulletproof)
Memo
7ba4173f097600af6af096553a0291c25a4e284f7e3e72134ed710605d385568f0760a3cf7c01028e74689c73d90bcac3025e1860dcdb22e51eecd13e13a63c4b944300d99da371a5b556bd3b2e9376a52d1fcd5158a2e3fadb40bcca854b76c8bbc95466aa0a5a3319e1a81f880c80b33ecc2cff25d6901d50d027f8f750c59 (encrypted)