# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
547515a6ab9bbb856b6efb65a35f2501afd330062c0294b2f4f31c2869851016
Pseudo Output
582196f0602ebee78418487887bb8d7b364e6f8a58132e06407ae0eb02786f77
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
68958e26ac8a5c0828f8141b9804589e6c3aab1461328831de5551f2278fa766
Commitment
0e6ee7653f433e25717e56beab35855b2793b044f97020dece6a88f259bc0940
Range Proof
672 bytes (Bulletproof)
Memo
6a62de87ee80c156c0a657819470ac6ea0f60488f9c93e5b629d1d562968a2542d20281bb616215888118361041eda363cceb202e1fb8e0d1ddd4774959ee47a406f0bc68e7a7112eb9a81a26206c0d2cfc8fff6c227d18a1fab660b3a5ee54643a7c732a55455ad840b6fd6db8c6716358ba934235bd1b92af5e5d240edbca0 (encrypted)
Stealth Address
78d3fd50af8c7d9928ec9d3a0e4cc7107f1f26b3468258b487aa8ff008ad4b70
Commitment
282af0709aaf19e45c74ef58fde7121f9fbb319a0ff808b17f87dd6d470a266d
Range Proof
672 bytes (Bulletproof)
Memo
819aabd2f30879b7895298bc829cfb6b804e2596bc25d70f456f8951e443be2fe0a20e161b8485267b95f5c94341ded63dbc1d385c2a89f001cd8b20e8d5dd884a74a7f545a1dc8b3b441fc232570e86f3e016ec3a6b3df1bfb8d85c49f86771938179c9658e9f2f8c560f70510024d2e77d1a1fcfb13faf88f946985a98dc3f (encrypted)