# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b440171f6a99ff19e442eb916d16a0516b4168322a9f65076e868ca8760e2d20
Pseudo Output
fa9cd3c3cb15d19f1b5b49bc38b32d9ffe54241a6fb855e70ef099f8a0adb83f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a4f967d12281c6a1e8328da867dc6e10c2d5da71a9ae704397bb55db6a4c4228
Commitment
dac8aa4a21ae5bcaf9d32c8d31ebc3f26533fb24242a71286ae69e7797fa1061
Range Proof
672 bytes (Bulletproof)
Memo
31af4c9e20ce7077097072ade85f1db9b7032b3257b68c02a733106929150482038d5d71bc61d3de49832aadddbc4951d2d4ba19506ef7bd0afc07f45dfbbcfb55b60d7a610bbd56edf6aad79a63e5ebd8317a8d560ac7f8ed2d8f506dfdee0eecae33e046c3df67830cc5c8cfb33184bffa900af6ddea2b00066e5d52a73aab (encrypted)
Stealth Address
e0b1bb680877d3aec0c4265bcc71491b64ccd9b8041b246bf8ceafd139153527
Commitment
426afdb2c022b5f424e947b9589a837505824109a93fe40bc5e4ac919f37317d
Range Proof
672 bytes (Bulletproof)
Memo
b8b4a3e2e436787e61d95136de1498934b2ad077d9fe40402a8f54f347ce597e8db874653a2baf5ca998fe42a9ee29e8f9cce76c94ad782fc29bc777e096012dabf856a4d31b32c9216de858d73175ac8d83a2f53b4c7568b0dd411a86d19923b79fdb8beddc07b4e045f4cbce148a2f6eb47606c4c0d2e736b28e255dccd45c (encrypted)