# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
50b54d150808f22b3daaa18191bfbabd25b24ed2374fad2bc3613f29fb510555
Pseudo Output
86d26f5a01c9ce8449fba29fa53c3b617e0269d51de314c1abb5b44190728575
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6689f84fbab8cf5e36c236f0542b4ef0040061585165f0b301667f7e00817d4d
Commitment
4eac097e3ef04064935fa6054f1ec3f40550bf951a30403417febcef7382095a
Range Proof
672 bytes (Bulletproof)
Memo
8e4a9b478ca2115e84a1c03f0393a01aa73adcdc1e48668ca357f340b95f0b02c13c93ddc870fcfcd7c06cfde4da2089327939a61c718d90a02c2a6805ad80a0a960c56abfe889bd8057b45b1bc3ecab1daf14b80d89527e64937c0b1f0f6eaf288f26ee85dcbf9b8eab800b597f4951a76cefe2e2f755f246290f0199805052 (encrypted)
Stealth Address
fc85bf2bb25a081431969e2d233e3891ad86f1065ad3e9d19a08cf3e8816d650
Commitment
68a1e16b88a4c6ba722ca2920d2a28b6071a7976aa25c5e8765a900e4ef2f006
Range Proof
672 bytes (Bulletproof)
Memo
a332aa249af8572cf2f68fd41cc71c82ac4f97721263bafe4cca3615814a347f074d5018b8a110c4e12313748ee778fe87f8d38898c7c8474c4d1d8d48de501158bb9170894a2bb20302b7adbce357bc5af667d96e5a8f55d7c0873d83e1891e4a3ea4b1cbdf99bb414116ed0c7e5e3b07be3eb1857bf6760280da9e080db812 (encrypted)