# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4229adfe0ec32ed2452289a607ebe6dc6124b1bfe8387d5d5aeadc1485367723
Pseudo Output
96a59e6e1532a89763a0c473057f7665dfcd822ee668da80ff27b597501bff0c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d6e226031248d28a8aec17336b2aefa894fe2997f839b672a9f18705137c4053
Commitment
42b49c0c4b1c0eac507e1ef95f28b4a10cdddba17acf8df04658584d63ab2e66
Range Proof
672 bytes (Bulletproof)
Memo
792996a8143d124bb47d71f8f3a4320e6fe2cd4b042b20db3196ffcabc22582c87862eb1bb8d7a32a5f6e2572d17e532df682992b1a7acc432eb28278933b8916313ce2e34de154f8ef98c29c9ee990b147683e60c0cd3ca2dc99c315724bcf654e6daceaa6d160dfabfe0534ce9b7273568b8c82f91e1c1761fd2a372cbe01d (encrypted)
Stealth Address
a01ef78220e5f16c3d4b699e4e5dd18a91abfbc43c1e7a933cd415981c0c741b
Commitment
4a9bc3f84414118c50850cb23262190a5c324141d92ad4b7f6fcee43a292265b
Range Proof
672 bytes (Bulletproof)
Memo
5f75d849504e29b7d67005b215776b4bd9eb2ec677fcad4b28d4977cb881fb2c440ce7fcacd6a3f2ffcb285c33030a4264ec07110379d0ba64260d6764647ad0ef7da2e50909e9e74c54f8aa96dc5d29176c8a9657fe5a08fe2b21f1fc04f8f8ec0578d1bc9c98efd05c0d011ce9f3818de7a664367aafae30ea0a5e47658b83 (encrypted)