# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a860809cae1d74d574714c259ab9cc01d7e8345eabeda94cf858a252da07613b
Pseudo Output
54af07725f9fe1194ec68d324a34027a662538d99e0df64a84bd9a930ba2492d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
884c39fe7dbade19023957c6c51521447e739641a9c87201478d76605a053628
Commitment
b044c3da9d1ea4bc937bf56636f789adab2d0ff00964992620133a04e1899952
Range Proof
672 bytes (Bulletproof)
Memo
ccccea63e0b00276933ffc1a70ee20c8e3e212fbf930a637e3c5ada0326b1a73c26c87128710bde211ab924e96c1355821595f36a670098dac277f323611238974120587ead3c15371b4fc417cf87ca95e6c87952ee30f8dd9a437b5819afd97e55d6d1032056ce727806d35cd6aa02dd1bbc54bc7d99d6bb58998a8ac4749b6 (encrypted)
Stealth Address
20343495563589b7aac949bc242d71dce01fe09d6f3f1037e820e648df18020b
Commitment
5cc5eec55d09aa6042bcfb6fcf2f042c61a5ea73e4a218dc8b77b1cc9c906430
Range Proof
672 bytes (Bulletproof)
Memo
6bdf164bb0e05be7007cf86d0a92757df3753f301baa5f743638a7bb14ff6f9d2299bc72f477cb790fa73c026a6092344d373893edacb3ade2c7fe81151dfa8f6e413e5fa722e42b244caf7bd3c1e51a9537fbf6b9402edfc20db6922ca4c1d00a9f06330c70ebf511764b0ee5a0a8c18f200235f651bfe17d2e0d30434308c8 (encrypted)