# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f61dea6b6d06058a3671d4b5d0c7bdcc5c19a6fbcafb398f1da2a5b43b2da00e
Pseudo Output
08dfb957c18abe5e414b82939daaf40762965f9cf62b413bdbf2e35f1534cb3e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4e5dc0d2b100fdad7d08cdaad5c3a086a32c5f52e9d77a6e542f50aee5d8cd75
Commitment
12f3ed03819e581ba101c5063ba539b0ea55de1b0fae280870ee595bb2d32672
Range Proof
672 bytes (Bulletproof)
Memo
6f1d13cd428e5ee58601fbc13d500ef898483f829352d9d413c4668d9985cac0b800504605476e5b9d66ff2bd62b468dda85cb15782e347c2127e3b2bfbadcd4d4d4c3e598922470903d1f2fb17e5fe2c590f2ab985d4a7bcc1ca3c7190b3e1cdaeed0ee221957846490d61801d9eca66a89a213259fa7802fc8e08fdace6243 (encrypted)
Stealth Address
a4f61cbe663d51b9fbc33ff988b9c7054b72a01a2462c7e61102e6fc15d2d321
Commitment
da5b16e9fbc857a45f74de8487f05c5bc754aaa4f6b3fc13d21b1356d2028438
Range Proof
672 bytes (Bulletproof)
Memo
151b040b5f61c1ef45e587888d00e7f719571edda04c8bd63e01e002eab73e91912b4246082e57ade0491729166aa19359b10dd351a1a9c843a098d25f08178a9113bb79950e371bb47af185d936a992e5ff0770a5746c5c7325457fc92a11bf81fd039ec4a2cbff86ffe2469e6f2bbf863e4d2912791a0ebc618fb5ac2a28a3 (encrypted)