# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
deb8ff5fee2898c718a647735bfd64e278d078a71bcc9d725c5e76e20ccf742b
Pseudo Output
a0719ffca4f0e471914b93cdfb30e525d5b3efebb056c04a38da3334c77ac35a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
880aeaabc633c623e490b65810df16b270571c05428a7fcd749530ed5cb38a56
Commitment
e09f0bfff8f35880a2cd2376a0c86af354c98fb262c8a4db28b8ce4fc41b0d14
Range Proof
672 bytes (Bulletproof)
Memo
70cb724f3d1ee2c896e956d25589bc50572ce0a666eaf3a24fa3058ea92a29e4a040fef42678759edaf57667e1aa238b30de171fa07026f39959c1e10034a0c1a11372cc6f300f6abe0282d60df354c0ac7d8e1640d6f6a8bd6df640fca7f81208e9e5a43074b292e71dc48e23b23eab80b8d04cdf0a82a159f7646f1708eb65 (encrypted)
Stealth Address
e86665a500ee01663253694f50a05b09e180633106171edc978c349006e4e93a
Commitment
c65edc287e0acbea4130051a3278882bafb79488f2906ffb1328d54d596b024f
Range Proof
672 bytes (Bulletproof)
Memo
3868a0865c1db95cff06da534f7460515a81a6bbe81193f3115e14fbcd5d52b186794c40f8ec448cde76b356b5f62fbce483db6ae7c2ca6b7c9c80db080ed6ec8cf1d6d6fa06cde114f25d6aea7195124e4eea06aecd175ef08b39a3004c01b76a9407555b685570af6bf159925b83c0f2c3a41a24ab96028e56ec8ec78172a0 (encrypted)