# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f61817fdd6848ad979ef7c72cc7c5c0fc360096f9c78f2b933802dd085ff5376
Pseudo Output
72dc700c222b73702cd6c5da60e4d45b3a62ee2a8d24fa405a5deeb82736272a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3e29f8b4c89bac3e236a551e09b715ca59e1628d30ae109a6b4818af58d6e32a
Commitment
a80bdaed391cb1591ed86a5c12c7e827e886ce9c54e914420cf479b100ff2220
Range Proof
672 bytes (Bulletproof)
Memo
d27e99adf7228fd87a02891f8cc9d23f846dcbce337627580a68ffa8b534ea9365ba593fb723f2e5c0c7c00a49b8e818df116bbd1a2d7a541991a8685f53399cefe90e19456d6d609c6c0d06b4ef9fafcaf8941aa8780530a71d2070f31f48289c1b4dbf9d536bc090093965c499f9ba2d37acf83e79dd61702143ac81dd501b (encrypted)
Stealth Address
9e61fe17db5b2e6709137609c682bb900cbf126465c52a61bbdc86a256d09114
Commitment
2824c533a3b5545a41a1c8e1e448a900dcf2c98902eeb7977319a43428680b5c
Range Proof
672 bytes (Bulletproof)
Memo
9e61cd6bf3d6d7bfc6697efac42c7d4a4be5f59457bc13ddcb1706ffa3227d3d793b490b0854976b642b9dba7765ecbda67c24e6a61e3fe96ca477aa20e682c45403c3e2f76c88d4d46b4e4cc0a65fc7d1e04ea46990a3ab1163b2654eeedec69e5debaef290645977d4d558ced65ac16328ef4288bc479adf3dc77d235e7b5f (encrypted)