# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0e6e9cacfd49477fa01087e0866f7940b029529f6513cbd6a5d6864c5bb71136
Pseudo Output
6a470616e59841d91c5f7ddaa4d871efc364696c003b542beab9055179ec591e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2656ebde87dc0a5652b2c4b0ab051f18c2d82172ffd874f686f2eb97f3c69a6d
Commitment
fa2773d9926c1a1d03cef7777a9cce79a130a46a253093b0a414ef0eec518c57
Range Proof
672 bytes (Bulletproof)
Memo
ee97ca6fdaf6f8d866112693c391aa982f41973bea967261bcd31caa3957b06ef2c4007f580cd716c6257a2f8b0a906c13ce2735b0d99d023aa446d31456230a2941359caf3e7ce66d5278a39b36dc79e9e39da10d5692b083d6c237e3b2f61b95ab03f93ec7fa50cf8ab8c2aef72417022fdd76a43c47e7201b3d5230a6a838 (encrypted)
Stealth Address
b258a223a606e7e4aa833749ee588bfad8640ff72cb34be08881fa141239ac5e
Commitment
12699b5f78c9550b6000faa2bd1c75bd22827e8c923124a1f5c7fa9b20372f59
Range Proof
672 bytes (Bulletproof)
Memo
4ad15aebf1cf34039734adb361260876a2a60d61648820ac6fa2b4617ad8199a6dd9533448ed7a7555169afead8f98a1a06259649db686131d644349e2f328b5fb917c2515718651cef935f206e9bc401cab2755f8f56b44570b24d2e77a9242dcea40d09c745f3f0af63c88fdfe9e1e36564ab782f94e545de87d6f9eed6a73 (encrypted)