# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c68b37d3582613c69496037ed22cfb577f328c1206fc84f677d6023d98fd1e67
Pseudo Output
86f7ef8d3f0cd1acefe79d568e77e590da79480869d5fc3160ff0c1153a2111f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6481bc280303e451a36b9b225199e62da0da5ff61082547fa1f2e042528f0044
Commitment
645dae8c183aaaadee2e8467742e77fd1e35cc7ca6b2fdd577ef870d2339af15
Range Proof
672 bytes (Bulletproof)
Memo
ab043c2515ab3ea889454f15bd27807909de45ec0113b98b198e79eb0d5f8260a80daa53d6deb78976ab707cc63507747dc42b6b8496d6e2506e32351e3d1f18b37020b12e022cec43dfe59cdcd0351022aa8695727a5ecb88df986fb1ea8bae94595737a46dadc25d26b26da0af360249c4cc17b25b69af735cf3581f938933 (encrypted)
Stealth Address
8474fe87995a3bfd0000b8980ff7bbc51b39ed7a0413425ef3ef59ab95691705
Commitment
b6e5f4c321dd2f45279ea054f3c5ca2fe99d85cb060938da41c661b1f7409102
Range Proof
672 bytes (Bulletproof)
Memo
cad5f38591c623004f7a66213e0f4cd8c931983de3fa363fb8762cb9b7d6aab32ea25ad6cb0939241544fe14d4bb5e4c692dd214dfa93d21f1ed05272ca583b6d8d66434a111ace6715554b2f4d8f7a5a8e9ffed4900e5a2d7ad109e60d577bbfab5a46eb62393d4d7373b85ca3f5be400fac8f1f2326294aa10700b2d2286e6 (encrypted)