# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1a3de49979f817c21752ac6b48a37546c49465fef2426be3ebd67cf0fdbfdd70
Pseudo Output
1c2bf610c7f4b3ce6420bf1e8edb5ee5841fe5ea5ec7db1cb3d886de53ffe825
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ecf9811900b3f940802b4feb784664e27fe43dd0187e534165915ae5af725058
Commitment
4ec307c93e3ded2dfe978eb695dbb81173ba4071f0af3b3b0463fbacd541b70a
Range Proof
672 bytes (Bulletproof)
Memo
2f768df88732fec00ce979c3f60407fa9d58878dcf0a7e17d5401e6f5a89e5cf313233ce1e3a23472e0a3164f5c23d658548c9dfbd073e54de11fd8f90093027d51e979f62d279f78bbd2c7489359dd63c9207a2e286e41ec3d49b703d996e71cb105aeb7cd2487aa62ca66f21383e61f05846cbeab8f40067f1e0ea00f5be3c (encrypted)
Stealth Address
86f54df8df94b34c0e0535aedd15477894e5b0863c98ce09556e4d9cf2f7bc15
Commitment
f6e820ec9219fe8829abc8a312e943e672f2672dbb4ba8098c3afdd75ddd7f5c
Range Proof
672 bytes (Bulletproof)
Memo
010ee3f8eafdbe5ef1f09601dfd368d28591adf4b8eb76c9345f96313b643460f9b5748bfa0f76a9cf19f1a74230b87eb6cc1071b5f82f36f5c11c63a41f7d6a3b1f7a6a148f0623d083e34b04e6ed1bd83f01bf0869d221d7e702eb72b32a661f891f9ad7d9b1058022e92e83718a6cc7a954eef8208e81be9ae3bcb35c5d30 (encrypted)