# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
380c9fa7afbf37d28730b981c6d54264bb89378d15561a9ae435db3995b0cb5b
Pseudo Output
94556b9a155250e16b6fab278dfeb12543ccd4db91d0b2081c1a907d06b4e27f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3c5c5c25d018f164cd3c760b50573e88945e127823ff41ae267b1e2f2ccdf354
Commitment
8e889ff0fd4b878d62793812a91535f879021ae746e822a5556f567f4c7bc672
Range Proof
672 bytes (Bulletproof)
Memo
bf8a2fa8b308816c3591e472280d28ebf6a73df3653b7b9986d13667197d8331dafbc2a669b12891c739f8d5b598ea5a28cdf8c64cee4d469121ae078ddb34d73549501305cbdf65e9d8a0e66a72ee8fe35e027129230dc324ed9bbb06e36b0abc9d7a87effe410f2a39dd53edf702fa00d25142c23bc3545f28cfa5ed914218 (encrypted)
Stealth Address
5ed40bf332c29bd6267ec23d25d5585f1a7feba18f9ec4ab48d6deaf61e6e811
Commitment
f8d2f2262a813898ac8011bd43455bafbd3d0e533112fd09b865de55c5d49301
Range Proof
672 bytes (Bulletproof)
Memo
961b0eb33cff17faa28d70317eceb2b6c175937cb270514558c8bc3bc27a096f3e5ab5913205502b22051fa13fa1400d578b4493ae89def9f81dcddac0fc4354cb2337cf5660d600add9891c3c5758cb571f0060a695be515dcadf7899834e0d5b0dd33f3b184d0defb56579e56c3475efd9ec4c8b8d69f1f53a260845a53dc1 (encrypted)