# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8868094cd10991b84dfba825652eea39d9d63ff41a5581a444bc607c3910c43d
Pseudo Output
d22130c2418685a7a4a84f1c783c04f8e2024f29c79e851db4951d6c4503fc49
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
021875340761ebf29139f1c8c2baa8b04d2377c8da41793f3f134ff13fd6d06a
Commitment
9205fcac03bc2d3bd21da5370fc1b9e52b987115165e35aaee64af91cb77c775
Range Proof
672 bytes (Bulletproof)
Memo
0931beda2583f4edb87c96a3d8bdc24470cb3473c47b772530cb56b482b96f66e95d4b375ad71339776deb04bcc0ade817d8012d0287f3f6a124daaec52d23f12841746607fdc18271ac47fb47119c1504f6de821d44bcb5ee3f62d2479f83bf763e4b19c404aa44eefe1fcd08734574e1b35c6b16e87aa275c828ffea354ad4 (encrypted)
Stealth Address
6a72be295482dfe0fe4362348c5448783165f297befeca9f115b9cd97e72d12d
Commitment
162d69070dea7f4a18f64266dd0ab73feea2ea1f628a58577a8d988f40be4a42
Range Proof
672 bytes (Bulletproof)
Memo
3e1bb6eb047034ffcd178efa035cb2cf10c52b3296c4d55b5f3425017be7d015dd7f2d8eea1446f2be22b0a481a98d5fa2089271ff2116c1e58e6c59bc54f2e9fb7d8162ba97fd216ac52acced700540b8b7752bc2cd3bc3f652eff90a25406e1fead233ecac1d5b90f730cf97120914a7b405bbdc063e183441cfbcec709a4d (encrypted)