# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8c8422b2a0c049bfc946e9474a3da6cea2656c8a71821f4edbdfa02bd42b650e
Pseudo Output
fe8559f662d05d0629ad0eb4c4d8d03247c26456036950e1427db4f1766d8e64
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
48d79c0ee31ab5680283c6ab3cd35cc0afa9dfef101d2f820e0b9eb403192133
Commitment
ee791dc438a571e77ef0e998b375566905eef0083f09d967a0f5c822157eb52e
Range Proof
672 bytes (Bulletproof)
Memo
2620bb67509c104816c2bab32fe9d00a38e972a629926a2d1a53f049a215b04472b99afda4ee71fdd09d197d6a5b9151484bd680224a02577e56fd874ccc4ea875887911a83c6d85676176bc7e066460c46aa7118a200e06d4e987d155d320351acda47bc1274b6f18c11f108d00d9bf8c870cf3ca81ee6571a3688f8977159b (encrypted)
Stealth Address
dc3afdaebd4a4a89bd0ef5a7c90fc406fd634c5dd30de2c49e40d55dace3863f
Commitment
3e3cba4b3734ba461223928f0fa68d5a8a4cae5383af020063d124131f5a9850
Range Proof
672 bytes (Bulletproof)
Memo
1c9614f5b8879f9749ea2d2c927a796d9ef92261fa49558e9fea3731a4fd80f03dec6479981a52b51975b8c7f4ff5eb7bbdeed2e09b0ab89f6e4bad74e545bc00da27ed122aaf2bf15f43b1ea77b5e5ece8edae53382cb814cd33d3b70bdd42d8613af30fc75ebd6ba13b01633d36d391f6b7b818c1c9c8696b788e69cacd39d (encrypted)