# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a8003186fefadebecbce80cfb8f2e864614824727f99ae964b894334b539ab7a
Pseudo Output
16394b1fdb536c264b0f73b67831d31b46a23cbdf619f03d0aee89de70f11a53
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
68040db0168ae8ee0bcec88ccd8d60b3062ff442c7a243c368696c239c5bfe14
Commitment
00b0fb3ffff343e23066eae11422d841abd5501ab90bfd4b06d49c8e377b7a56
Range Proof
672 bytes (Bulletproof)
Memo
65933760a29beb7bae217846c672aaa8e15aee8ad05c9ec707c9ef16bb8182216b6a4059798d36f7f70931f301dd99bcb6287b33b3347057fe3558094c7a3b7ae8da0dec53a6ea8d92144b558a33008c563784eec452467cd428c9d54fff70c8e51cfcaf045fb4aabe4cf3a4aeeb9deef2b153eb986377b93151125930ef0419 (encrypted)
Stealth Address
d2dec093724e787f056daaf5551810761d225cdb9e974c0e48d3bb852729cb76
Commitment
0ecd07115038e0cd326286f8a2ad65dcafe95d23b7b78a07b495d58cc9e9f379
Range Proof
672 bytes (Bulletproof)
Memo
462160714c12f17585d3190a47e89e084dd80390cd5663c6ae522f88a738b132cfd50091109e2cdf7a13859c3a3d9f67b45acac754dd23a3a184fab166349bbe37811eb609fcce93c58bd1663e889a3464df73e2dde12551980f9d126bba0954ead50a32ff8788a494384bc3e9e799d3e676699f33aca7a0b3e5c75e342ea328 (encrypted)