# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d0ed7a2507ea4e1ee8d91023670b36e2f44444eba15463563e3470523c14d77b
Pseudo Output
9e04ea329a02bad0d8cabdc4b5c87a80a3dbee5e4d551c1a33a1cf9240bd2435
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ba71fdf60d429fa3dad012f6e501d818ef5ae5a848c5d77dc10026e4b9177216
Commitment
46ce14ca1b2ef2656e86c3692d13a871f0d61c02da07556981b8d6e18957ad72
Range Proof
672 bytes (Bulletproof)
Memo
10c4df616db9a6b131d369db7eb5126d3bc417b325843263a246c40a02512733b8197b15b287014eced2cf741821911e973b1a3f18e7df84ab1f5dfc1c8ca6e58e65f06d025d6ed63a18c7fdfe8fd3619d3339e3c6f6615992078f76f1402a054097abcc36f7ff435622ff4b37ba231f07faa50d82b812340256559a2cadd603 (encrypted)
Stealth Address
0e84dab3aeadf2c1159bd389b51b95d1daa26ff4ecb935409ba5320c513e4f10
Commitment
2626ffc266a2304ed463ab99c37840d87d9c3f225566fa1de5a512004a2cf731
Range Proof
672 bytes (Bulletproof)
Memo
3b2eba6b8b2ad146fee26eaf31d8d1a83dd133c984085883cf7f2d805ffefabda8e68c80ee332c917edb9d2e6e426eac635e387e055846626c20579496baf7366624cae02a8e9ef2562f8666688913ff5f12e25bea64af2ca8d183cfd8eeb2a64ba894745a663eb2f1c753732813b6a3a369678aa6fcaa7b688e54852da8f754 (encrypted)