# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6c1884edd6f1d7a421f0f229ffebdca755116ba0907942190d05ede35cf4b631
Pseudo Output
8247d13c9d6915f597ecfde97c7bfaccfb73ab9388920027a2980173cc59d551
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
407cf25a3cff51b486f5b93d9b16b1173b9461551054da9394cc0d3e8d836934
Commitment
4eab2442a80196f31bf54f3efe764ac75432cdedbb0ba257ddf06f8490cec305
Range Proof
672 bytes (Bulletproof)
Memo
bfcc6ff5ba93b0bf41fa089313986ed34f76e3db44fe52efef3b381d587e8e1383672ab72a23e9a57ed6bcb5d36eb630c2901f61cf7b839b57edae6d4f64945a01b06e5965ae8f55b61417e18cd41d581a99fe696e2d453c9085cdbccde0d0e28cd3977470c7857016136863d5d1c8c74f77b97e0436d1a58a9209f891239225 (encrypted)
Stealth Address
1013d36837d3bcab3fa6291de020cfaa594e8d8fac4500b09e2b18e42682171b
Commitment
6e83ab2331cbb4355053a3df75276ae3f32277c30e5a5f500bfaa80e137a5c2d
Range Proof
672 bytes (Bulletproof)
Memo
051b47cefd3007f6f5ccdfbee82059237063a28e008908da76ae387e6bc5fd804a493d8c68cbb74f8f0493b0e36197eabd1356b4f5d372905ac4ae4b86486357ee02859d7abc5c417a9284a8a631cf7536ceff443c1d25c7924a517452af2b03c63237241e5a3cf368cdf8e84e2594fd8650d7203bd83890a15c50b503042b40 (encrypted)