# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
544fa7d59adc88594a32ed9b8a0f823cb136169d7708f5c4b3af76cc7e962762
Pseudo Output
b8f315a388cba590eec6e8dc23c61e6b0b88ed9092602cd0b5ec6398d94e4613
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
bcc6cd063b12fb402de6eb882a53bab7f3560620656f561d1327cecd9dae0210
Commitment
c8d362d0719f0b427d19d862b1c0de618a6cb1ba51801a91aa676b30ff93ad3f
Range Proof
672 bytes (Bulletproof)
Memo
a892ff7f21f1a31b77ffc400b34bcd720bf329700995bb98dcf39c37e8ad309cf7f4f1ec12b340d88758e0c47be330ae3ce20498f76aa6499b367dc4cbcea368150a5212fa4c36cccd369dfbb536471ff439e99978381eec8a81ef15833da083d5493911696dc128695ef2ec331ae775240228c7fe1958fc9aebf3ada0af9e90 (encrypted)
Stealth Address
b89029cca1251b626ccc9ab48d94061c990281371eddbde4e2149efcc4087b14
Commitment
1ece27594f81501098e64c933e6be5a20141a0b3e972d3f7a321814e0efe694d
Range Proof
672 bytes (Bulletproof)
Memo
b9084a265ea4b75624545063bad5a114609b532429d8ed4898196550268df0e4e65fae4a41a5459a3c3494ff5f337f988fd84725c1397b8c6c0238392f1c2389069c75beeb3f0da2424c91c2bd2dd92f1cef0bc3c35f126c2f53228f6c3697bd974731eb4dbc4c64182293e5de613e620ecc74937a02fc1bec217523fdbd98dd (encrypted)