# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8a2e9363322ad01fe19631582eb482cfca2e39497a008d31c07e7c2721d35460
Pseudo Output
8e09d0378a5a3b5d77caf1711eba16e7dfdc9ff2d83741ff2c01ba8099bd7659
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c0dfa147a36797c4f2781d34a2385aa914b32c2fb7c09f62456783d1d9aa9062
Commitment
065df4e0492028576d1a99983330724ff13d38b44cbf714550585236f172ac08
Range Proof
672 bytes (Bulletproof)
Memo
1c82a779d570eae950e0d3810e1265a52f935a17d44094ed016ad1f5819e2896e82316fa1b84155bac49e7d17373e1f76f241451c633340d4aa8f84f9259328c8b9754d4c84349aacfe6b2dd0f30bccf6b1ac62fa4f0e666416098ae2d5391c1838735299a7fa6ccfe9ea66abef6424860e6ea3d668f95827635f36a6fb3b5e7 (encrypted)
Stealth Address
962e720ef33594c69e1023db6668a5567854a0af8a3ff0028ff5205b9a34e362
Commitment
844c6c07bf8fceb43ef46d5df719c806798ec1f146b97075768863461980e907
Range Proof
672 bytes (Bulletproof)
Memo
d509dbc3490d4836bbb7c37d8824a262eb29e5ac64730e7cc2553506a5f15df5bdfe5a3f35817257fd82470828b7da6a3d4cbb132c9530f9a525f52b651de6f578c8eb3c2f9e07800a8cbd2a53628285d363c0ae2d452be00eedc79d7570d5e84d6989f811f1cede77536d94bdcd220502e41155db17aec898d9d44857700b45 (encrypted)