# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a4538bdc871f64c43d0d34dc95cde7e7bbd26835cd979538310d56a8e2793000
Pseudo Output
d8621a50983042237ad781dda383ab515987a43bcf18c16de4e547391c7f7541
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1eb4b609feace8e8552aea8d37f31e2dddefff59e6c1ed914843ee1c60c01d23
Commitment
908b19388ac46c0d4bdfa30e8195bfe98c306c54da132cd5afcec5380d8eb225
Range Proof
672 bytes (Bulletproof)
Memo
c6a9297bac309cb6c2d6d888e9841c783aff116390772d231a293fde897513c928e495ecc0fbb925c19b33fbaaa7c42e9a4eb8fecba58c78c486ea220e68cec163e51a444e5b7a39d53b26f45de04b016acd417f633de8c3909ac4d8577af7ae90a91aa18a7030603def089cd5572301899a580c2de5c0317a60d39f10e569fe (encrypted)
Stealth Address
66f42aff6164cfde6afe8b3300b6497907d8472d9f2771fdc070700a39cedb04
Commitment
24a3ef499eebd5386a857ce76c9aa85d15f82265cc4267dfe0b8c57d3665e53e
Range Proof
672 bytes (Bulletproof)
Memo
b7293114d876b0f213079f46bc0947ef093185bb0beb8f36961d49faf42abc144fc297db110753071876d57230d649aa1fd9a877765f0919e21a46da4da87a3fcb2fa20096c0ac0ba1839246f178a998d9396cb4ca16fc69527a0c3da47b57b88422763b3387dd9cd0a9200b0ea82d2f7cffa63f8bc39b0c1f83b14303f2498f (encrypted)