# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ee8140ba030f2991264c87a4c412495fd7ec3ecca99285ebb223c32d2cbc6f15
Pseudo Output
54dc438d39bd4ccdff6e2e21ad249cf8a58715ab36a19624670558c34657b578
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
644320e47ade49347268b7f91ded0ebe10551bf9479127499c2215bc3e296934
Commitment
0e9f330975708c4e4806f6cc9547d3d7b29bbc8936a16b2ada61dd2fcd419450
Range Proof
672 bytes (Bulletproof)
Memo
fd632e4333aa99019b41a6fb6f2e3cf66a91a128f10da385347349f88e0ac56cb928a374539ae1eb38a8b6d5a285b8fc2889d8577bb75623c0ffb83cb8a7b96706511679e70a5114dd8e3ef7caa546752e86cdd9ae99c0f42c27472c1fccfa51ed4819fdc6b1ce616a6211ad2f6edd1205462e0db068e0e5381e8c92070a7be9 (encrypted)
Stealth Address
5a2ff8721565bf1093fc30f4bdea81062d5e0350208bb8e275e08038eae9331e
Commitment
acf8d6996a833ecc9827f629e0a89e84c9d658c21ced4c610e04da5aec7dc44e
Range Proof
672 bytes (Bulletproof)
Memo
aef7c2e1a30f5413a653b8023b0d5721217fcba66da715f5239bf3ccb7ce0e32d4dc3845553ac4c6e979f3c4590a7d6fca3fe8cf22d3e75827eb088c0a9b7de4cda14e033eef4cc7bb87a4548cee1a71ec637bb200dcc3e2014161df111802f2411169903f7dcfbf153fb937721500ee934e7765d887711bc601537cbf43dd1a (encrypted)