# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
48f3b0505398d84e7b07d1a35934067e4430cee4b720fbb506702b73eeaf243c
Pseudo Output
96599213698b59d4634200a1a38976b337ae83b22181ee61fed58c120506071a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
12d36fc734e027505891994b932f03a290e3792991372a4b71f509509695753b
Commitment
b4e15a5fc92933f1012f643f8bd014c71d528989b19af9d230e4bcd0cf130624
Range Proof
672 bytes (Bulletproof)
Memo
64a51e298a723c16fa17e4178ffd815117fe08d748d1e7820ea8cc863fb22c6a133d689b0e3ff18cc6a25f23dbd5fe0f2ebd2266d0130a2edef8b677f36a39354fd028f10c8165515a715469920c0729d9016f5e3af402d2ead31b26dea5fcf7585b22a60a2a6c96744ab30d5f9006a0ecae6079cb3f4a9b9b517e2361ee8621 (encrypted)
Stealth Address
04f1363d0d2038704a081cf06344b2287d470227bff30e77f4154196d6f13d1c
Commitment
04f5279176049004a6b4c8f5ceadd2563517f97acd73cf5eaf81e219e163b851
Range Proof
672 bytes (Bulletproof)
Memo
a4aed6f92d4edac9bdbe4f1e41ab950d6dbab9162596e6f10c0423ee74e7ec84a61ae33be26748e11ed6c3ba04bee226b848e8a9964a42f0de469ed353237f4e0cad440a70a8506901c462c3d3887f75893b131e2a4a294968ad7477862b4585525c2f04d17284c7e655351874086d70dcf1c13ad2ac865e3a6c3b47e9f7ae7e (encrypted)