# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
36cfe249fa67d8145f03e7725b1070984615026759ddfae74853f6034d283c3b
Pseudo Output
d00f9a8fb5f9b72e748f48d02341eccfc50dcd0fe775f9476a0dffa3d2a3e34b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
028a234dd79ec9cc9f19e0fb4a18da2987ee2ed39a69a0a6b16730570e6afe19
Commitment
0e3fae91c7bf91f95f344f384df9275df8af4e436b23eeb5760ba5cc0789bc7e
Range Proof
672 bytes (Bulletproof)
Memo
f68082ccf7ca2df93966d4bd1bc5bc84359717b346300445fe50c4e76b86fc5b7ae3c1ca97597a5db90cf6aa5e3fa06d49a3b83ce9b794cd18461edc9b27fd5433feeaa75738456df594c4778662b84c55bcb6fbf478a43ae92870288eb4504a0648285117c0c957d8111210f72ff605f6511130422e9bc3920db4d328e0640a (encrypted)
Stealth Address
4275a36d57e919b7f6f3b43ea90d2f239cf563455e1982778a97edbf9fd42f30
Commitment
22d48f7a9470112b86ef3f559b1a925c7bdbf8b29cb15704be41a5e7402b990e
Range Proof
672 bytes (Bulletproof)
Memo
c0d926a40de31a8b1184747c8dd6fb3ab1b7180c7ba99e59cc8e14b28636d54587219c3035fc9f509b00c6eeff6fb6fa7e7d5618a89654276138420968e0c0a7b576257aae5dd9d034f87df856d8b8bccc7233602329ae2b3f132d732a92b96caa0b5d6efce789fd872e4deade65584e86646b3a4bf984ee18235b95d634d5ab (encrypted)