# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
30c93ddc488320ebf042e0e55d669ba654febd842c79294e21155b0e0bd1ef01
Pseudo Output
68b5d6741eca3fd4bbf73257c6f49e5f76c47cfa25785412ddafebd78ede7566
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
36dd4918a543bf1119f2fb614728ee04c6d0888f744878cd8a80b38c1d46493b
Commitment
a0babdaccea4e2981650022cad0f4dcbe3e802ba08a9cf7a6b1feb652268b104
Range Proof
672 bytes (Bulletproof)
Memo
652353f67ff6536f15a7beecd9792addca86ec86b688b9422d03b63d7d4778bd3f4f2901db1eb46d31c5e4aa5f4b3e6e67a01ff9d3080c29aa4e425cf989ac3a94123ac05444f21004bdb083be20fd1917903265da4646d45a0ee53eba7734de3e1ec7643d4cab67e61ab29f9874dd51232b8d96e6daa9634982d6dd24932730 (encrypted)
Stealth Address
1eda8fe0af36f500631a25429c694e92104ae4ed7b3c407e94b19145d3e6b344
Commitment
70fd8825d7264f8c432322cb5a71d9fd57f2d56109fc5d71410f99461a0e7e24
Range Proof
672 bytes (Bulletproof)
Memo
a065555f0c92426eae95e37379b4c2e3b879871599f89b9054196d25fc0ebca6c5b88273cc70950fdeb2c6b2bd3c49cbc4f8e64cf71ca1e3628b918cac1037b91c63c35b9aaeb08dcfd6c427fc905929a423a9688156921f2a4b95431f8529126af4f8da90a35f27e6c420d006f601c29a434abcb6baa6b1945b4a981e4c783f (encrypted)