# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
820d82d23cb706e958b959c1344a0f13e819d5040733e77018ef0b804d2c6922
Pseudo Output
08fbe5d90d25b0e0062e853a6cb38cf84e145c04ba236e1fc0ba22b0baf6c913
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e4869f65f0b8ea89e0e1c006ab9f25f5d5dbdd1bc113d06d6bf8ae7b3a1e2b27
Commitment
9cad97169ddc733415d9ba663ae3145543774babfbe285f078411bef3e76e417
Range Proof
672 bytes (Bulletproof)
Memo
0aac22486157b318979b7691810486caa39e6990ac00713ffda6d66f8ae693c858f8f3235dd53b7ecb4e581c1572a73dcd9a5f313fe0a8ce0bab9bc67278cb6b44c2c8245437ce58a4b65c08cba7b2da6dbd4af72ab3207035a89f7ab977ae3d468ca9b02bbc501efaa81108405e5e17ce90cc396909384fcc3f667b790a2bf3 (encrypted)
Stealth Address
fc6ed64323951efec258348c28e80fc7ebc7c71013bd9b0861971ad9f8284224
Commitment
8ee54f15adfabfe0730a3bd4413afd4b9f80aeff26b52cf72d2d60e3ff31c407
Range Proof
672 bytes (Bulletproof)
Memo
9cfc6c1802d0968e76d00ad8770d935755022e42a3463789bdc5c534ff0974ec56a78e6c8a1e0d6c157dade1b5bf10fa07fc704968ae6b35935892274fbff5911fc006eb181f509b6762df93954edd4804172f0d337de3b9e3869458d7c1670172a5aaaae560e496d2ff5916434826a7c5c84cbad5437484b918b4b72034cdab (encrypted)