# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
12eff562e2119e6faa3c3fbd1490147420c54d8a0ba1379997d1c001dcd8a445
Pseudo Output
660f820f508c4d490dbe129f33dd0153e8e65f46983d77089d44ee7b425b4023
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a0e16e8af7c74d9bfbdb8416ba6c2f148783ae9655dfb140f11d2085b8801c61
Commitment
1a1a4098b0a81f69c3a4b58877e83269d51524b5108a858e01f05596fa5f9206
Range Proof
672 bytes (Bulletproof)
Memo
c2ee5978dda9661fa7423be6880131b04f3f73c8b0ad4c64f3fb52492f413ca9e695537bd64ae95eff5bfa375f68604214cb0ae903d4bf95404d4caf39996da45593df61dc134e1809371ae29596588c3e3f599e802d5da6c9eafcdaf63d7c366a65cdae534ad9036c713f371665bdd568acf7398c5dd1c8aae5523ebfe118fb (encrypted)
Stealth Address
807d7572a1dc67d88e63e360733378be4db0cd5516f5809f79ca508de38de406
Commitment
6a59dbd34ffa11bd9f58892e4d85a41f71e2eef95feacf41fd357e2263ae9b49
Range Proof
672 bytes (Bulletproof)
Memo
57057ff51d20bccc1e1c3c28f4f5a0c6b72ea02bfb7f743dbd20a1009dc13ea911e8a873477326bd1d89d4b626471e2b11f9de68e55f534284e77d3505c50d374a36f68c609ebf9a7f57f53da1af939d435f53f3284fddde640f75b023ec9a26d982869f055163b2809606823d17b9fefd0bcd9c371a250854066985714cae30 (encrypted)