# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b4b9bf424af92bac0973e03c754e6764e109bbc5593b8990fc49ba366b96e27e
Pseudo Output
64609bc8cd75192f9680b054b6065828fd8c1815ac8fc80faf9ed400f9df3e55
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8ce588da7485b6d69f35d72a156de9bf7043b94564033d553dbf1c8febf8b968
Commitment
16343c6131fdb58292e0cbd255f3b209c174d864ed32e3397c63a9991961ab63
Range Proof
672 bytes (Bulletproof)
Memo
8c836fe38ec54f712d0c78775af0a09b38b60fb0592917d7cb4f3e1202d7b921a0aa161b7d288f09fe8c30746d8b6c2b0c14e2a24b7052d00e387dde2358f54787e3611463fc7480e840d6df42a19c4d8cc336ea14735e803a3c3d4ad8e8cb1ff1f0d6ff5a63c67357fe52c1dfde7ae3e0fe1d7783b3a39621a01383ffc0722f (encrypted)
Stealth Address
c8877f675518c1d9e42c7c61fedf41fcb448f313f8712ab4ec008c2020efa726
Commitment
3846d96b7c5d7fe676a0dd96656c99d5dda5ed9a4ee4e08c41eb31ff938d7b64
Range Proof
672 bytes (Bulletproof)
Memo
9b1cd630d7bc1daaa5eddee543988b78ed7d153e2d32202b0d1d44cffc5171fef5e38baa6ee5d932594e78dc10d640232b126db64b5226f4856dc31e15473b7f7592230504b188c16bea8d6a4fe204965a54b122c3e4db7d94a6da6b059fbcffc0d6b41f3bb07e0223802ea2b464b4dd7d0825b0d8a7a52047105acbc93113ee (encrypted)