# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c61c3df3d4886f79effda2ee30a00616113662e5eb4676e366f92c95fd14777c
Pseudo Output
1ebf2c5bffc5cce47c6e3b63542a44cd2475149d5950cbae33054f233a74881b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
64b53f9029ba539dc52945c7e7f963d91b79f9641c3659cba0a72ccdc3c48a67
Commitment
f4bf333d17b8caeee9bf9bfaae137b6020534f9424738ce429ad127fbd156242
Range Proof
672 bytes (Bulletproof)
Memo
e12195aed00e7e41bda76f0950ae4bbb536945bd9ad1dfe1b9cd8b52ddf46ab628d31210548159c66789ce7d212949cb3659165720221fd0e2622d80dda5a3b98af286a34e608fe4a078b1b58d54a4eaef10f1dcc65d9f4f71a7608905336618a0647c87ac471fcda10b48443dbfa56d1f38dd08b5a26477c132307e5c4550ee (encrypted)
Stealth Address
5ac8337db4f81ddf5b538d1e5cfc43b0b981cd30749f33ab6a6a44815d29aa7a
Commitment
32d54686f60480cbdf0069770a13b23b72049f06f8fb82264fa6858520bb291e
Range Proof
672 bytes (Bulletproof)
Memo
657145c59e0e65b7805c3e648d7495bbf7e21582f03ce8e4438659b3600a70a18521c01e8bd53da99906e18161cc95aebcd07bbfced0edf8f181a7732f0916ed38bce58f4dceaea77cb10f684e50fa8607fd0a60ad8f0a8e7c5f3eb032aa188750ab9e7e5ffb07055b3356edf050bb8a2e9eb1f055f3097d90ef052e8c4300d8 (encrypted)