# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a861ccd06c60369af893d89726e6b848121702f97be759a2870426b987c64d71
Pseudo Output
e63b7243676e8d630168bd39574792aa05536d03c139dd7baf7926ff46664c32
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6086cdec0a115ee839703211606babc864428f41f917381e8daf90d629e0b62e
Commitment
cc7a18ff4afa92965d322473fadfd2c0fba729a081b54a7e5a600f17f2e25160
Range Proof
672 bytes (Bulletproof)
Memo
c38185f20f53cbbd3cecc69a2a13d145fa2ac2f8c36a603373661eb5be02a67fefc31ce70c42f5e95f907eed0e62a8f4b292cfb33c0a3e8ce76df39669acde67fc030c2bf4125d7626f3e9aa33850290e7f15de8b537a8308e380aeb7c0898ab325067ef2bc0db8c5c3256a47efc55d055f0f97f175c63edfb57d78c272e8bf1 (encrypted)
Stealth Address
fc191876b21396a89a509d42eb6ddc41e522a2af0301c91660db1100419f035a
Commitment
3e4e34373a659832c40f776d444d6773cc2e07b2b5d8d0e6ba2df6f1c450ac6a
Range Proof
672 bytes (Bulletproof)
Memo
6187efade25d4d7422d27a281d6689cea3f19f2ee901dec3127630a059ffef48755cedc1f7e401aa346128efe757c18db3ee5e3af2b3f0dce964fbb79d8755dbc638783760cd266c3690d8ea7ab062cfc9fbdb8ad3f349c1a493001455edf4eb6e0e08d2dde3049e46c93e081a08d265efcf5a0865db97233d1d6c5ad7cf57a4 (encrypted)