# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e0fe966c7e581e382755c5dca5dcf4c06c5e9d84cbeae739fa0a1634cfaf0c31
Pseudo Output
6865e6b88cb14b7e42e958ba379664890ff52964fcf37c8bae2b8af1b43cc676
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
30804e728a1d4d166f7eaf4da3a1fdc2538b50cd43078215158c339d046e9c15
Commitment
d24d23c70f0bd074c49cd80d04a1d229bf0453da8027608785d263e9a3004729
Range Proof
672 bytes (Bulletproof)
Memo
7a8ad320f98cdf91ece8195ca3ab518d8529c1f98384eaa09b75beda18e12e217f98ab876370fd310653479f57dd953ff712c56b0c479cbdfbd33c7770bf65c228d2ab430ad97d8984294354563ad42cfd5b8e6dac327f749883e774961d15b99d17f2e267ada6badff529a3bddb8be42e2c4bf2acd69ac8abbdbfc30dc70533 (encrypted)
Stealth Address
a44732d9407f99586550e22d2d953cec7c089f15533eaf4d8bf7559ee360e349
Commitment
ca281b0f5fd7a780c376b11dd010c07d3993dd2a51f0ffab19b8229dc57d9108
Range Proof
672 bytes (Bulletproof)
Memo
afad7701d3b37d90be01aa69148fd61ef4d6a1686f4fec94852b4c36ba2875847ec6c2f86f10ceb58b7b4f625954d0554f3f23b750a80c0f5fcf99b8c3ebc874f807cbd1a2e074f2210c01206475fdc46a95cf320a57079aaa4f76e2f4e811eaf218c926ffeadf3af0a0774cee079c4e6ff08d9efd87c70c70a5ee828c62d51c (encrypted)