# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
029d12703908eeddc4c4cd6bfd6914231ebaab0f2de15bbfe8e5351b880dd601
Pseudo Output
de1b5fc168e93666d66728becdfdea38969d120601666fed69fafc89d4d3fd2e
Key Image
0cff63e42f37fc291d59a459e40894719cabeb4b36a565885f68b2ee3dddbd59
Pseudo Output
0a4e7b8dafbc11021824e7bdadf3d205c958f516b2ed9451b8e103db6513fc46
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b4b05c548ef415705f44703d64253a187d41c7b8577b38b44af6d76ba2082e79
Commitment
c2096b9d3f92ae6938f6a01e4c351d2c14d8819549f9d484dd9ba1d711127760
Range Proof
672 bytes (Bulletproof)
Memo
115559cff95ceaece5e3e9dbcc6995cf52ffc082c75eb5a7e1d6347a05f0aa73edafdc1fe287acb09b91d66d681a452fcfe6f15b28aac1a86f366a4ad8edf4c52f9457fd744ab17354f3d30be606696ba894a3792fb86bdf50126c9614ff3547592a1beea3a32385a564cc9faadc43c0eba67c4777ee76d4255a9b90eb9458f0 (encrypted)
Stealth Address
fe63e737475daf04d8086d46a323c34b9aee2c2b347d7dc5f5d5d4908755e903
Commitment
ee44daf2237cf4a973bc9831bc7da6b17be159cb9d00521e11761375bda76644
Range Proof
672 bytes (Bulletproof)
Memo
39d577f617cde426720f01a56724492cf9a5c934e777883778f6582f8256c40910a14769d439424cff32e0639448bb395cc82f0961c0cc6f329d11bd3c547a27de781b1e44e67e46775f995e218a324bb8ad844093690c343cea799800956a419b965132391f49575c9c612b25a61f4710ddd13838437aefa8d1d856ba8b0d50 (encrypted)