# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
88b5b6489f7228ae47a780dca466e9d75483a76adc0707b5e79e17ef6bd05f22
Pseudo Output
4eabfc2883a36de0ba9c67363ed541fd8617a907f1146f89debd8f41a93b5f2f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
12a56c0cd2ffe4ecfc6cc473aa6081a6251f732584d0ccd6609334eeef529822
Commitment
7a8b8f306e58eae860b65ab3aa5f619425a311ffc57175a786a319e40f9ba12b
Range Proof
672 bytes (Bulletproof)
Memo
16a4f8c866cdf36cfb305830f96d0685b3713017087919e4097d72c62acab21d96c949cdffbca92094d89786915faea6e4d8524ec591058cbdaf2f32941e44ac2ada96d19ed105b74bb17013bf206e5fc25908c842b6713ade74405518abc794d0c823a0288454cf9670f8a0790ebdd5a3aa4e16ee74bfe17396e63c460a2245 (encrypted)
Stealth Address
e065fec3a9694680f9e631c7ca51cf4ae5e6daa712bc4a5869c01440802cff20
Commitment
60f8f0d80a3f9ad8be12b948b64366e0b2661dadb66528b7005b562064501514
Range Proof
672 bytes (Bulletproof)
Memo
3a7e01592d690e0ddb45ff182c21e8fd0bdffbdfb6fad0168ba6337cd2be7225e617dee5fa4b27a03185297e72a5e2a6a55acedfec7b51b1e2177fdc922bab80fdbfe4ba8d474e96a1ffb6325428dc3c67b5205c64377c256f4fc2e254582d848afff2cbfc57d210e74017af6d9de2ccab5aba5daf764f6766002a04226c8cda (encrypted)