# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
80ce31f088bc7a60a74f871e069d786246e2924c91763e3efea7cc98de41126c
Pseudo Output
d8a8fb7c5d0d7a4534381b06493118b9b7417687ebcc75eb5d5726423c15de66
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a8dfcdf4c8c0004deaa9353a7da096acd172ba9ab5f0b64fb2e8a30ac1914e3c
Commitment
8a9c464ff078c4a4cba5df2f3ce8c97808981c9b8c7cc03d8692ab84870a4651
Range Proof
672 bytes (Bulletproof)
Memo
306c0faf08cdc7475768a00a8ce6b4664d9198bee995c4e4e5553d748b3f2e1a9afa4dda247cd049d7fdd84eca239c1b4d78b446c27bb274ec344ff072fa401e20606b43fffe1b9f12c14dc9466275e767cf593e877cfda6ac25bc0150982205d6f743ce28d2798d022fa0bccc3fbd240c6f9c78e58dec25e950e4c2ea4e35f4 (encrypted)
Stealth Address
a66f57019340fbee5831e7aeba49e00068b875895d926fad21881b985f26a546
Commitment
ce367d5e9665dfe728c9d089883237ddc6222c7e52e7479f3bac3733d8793963
Range Proof
672 bytes (Bulletproof)
Memo
5ad8746a68a145c759bedee82dbe00d80d03c18477475d455cfbe1484374c555aa3bcdb04fcc0bcd226ebc3f078d862df38f5b1a2352bf79f4252d4abcc02739588f54f9a2121feaa39562b09c85d033b48ee232387758217d2922307b8f40f04c8755b16944321639971b50dce73808ecb06edeba31af45351a9cae8a6a5caa (encrypted)