# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
72be3a0cf5d4354ddaa478112ec5f0aa3dc462ef9f3b3eae0829d4da8ca74062
Pseudo Output
dee8d664c18b27b87073d312ddd6513caf12874cb9e9b4a7110f1f9df9a0dc03
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8005e8aed9d7e5cf11b76e15b8fa6f277b04be749b2af8efa3adee575ba1da53
Commitment
b8f1f1c1e9564bc9e9fd7baba486a6fb564b9d9e5d052787dd9d18a83500e54d
Range Proof
672 bytes (Bulletproof)
Memo
63d7830d659af0ab548678965ea47dd1bce8bff8593399679639f3ab3245d39b91dabae0e269b0fa65ea08cb09fb11a9b8e53ef65a2a5c508c1ae6d7fb8513e86c0afca4613ff1b291a26e34f79c2281356d2d81af5881c98fe5307146cac38a27359569d9e2f6ff201188350e9a4cf1926b28e38c96ec461c7ddd9f9d4d06ea (encrypted)
Stealth Address
9429469cdae7afda2db1c7eb0dfd0dfeee532d7089fae1f5f0871feb72a9ab70
Commitment
883259c1aed2cb17cf879e27c632df64d2a9492a4eeec2d404d27c3d26f8ba21
Range Proof
672 bytes (Bulletproof)
Memo
4e00d8ed003e51a95521e48db042fe49514c5cf5c54d2806cbbcc825634d316d208329027cb7578b65a413bbdf11210b69e25928c2dfd40bdbdfc80d9ab74ca42dc69b623a9807008fe4a879c1249a15830e1f80b6f85569d07bad5830320b8c97d9b49efb9ff5c1c6cf5434c86210a5d871a2d5985a6c377b163916d9370efe (encrypted)