# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4e6c303a74965ba1b395c5adfc23bda8dd190f0183dc79539fccba26efb0ac79
Pseudo Output
fc0afd40c61c5d3f037e23059b180247af39bb9e30609d05c5beb71a62fcb00a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
64432852f3dfc902c0dd2901cdae0db329dc404a726ed85024a25eda17b7a163
Commitment
0803cc1f52a3a60cdb45729d607930427cd43440804ff04c838b37d53ab47a5f
Range Proof
672 bytes (Bulletproof)
Memo
7f34e096f4680bcd4382d704e18361ccd17952836b1534830275700096a160d231b06e158bb78e9c0d8e211162be7e5cf6ecf788a1bdbc2015e852bf9502ac918fb7104a20e1ecab8fb2039a2864833b5ca20691285a7cb329dbeecdf6891caf0edb935d7c97503e470a949c0d8955deab7630377a833492b6017c8927a1f16e (encrypted)
Stealth Address
3c14793e6ccf43b337222b341d0c0906898d717648c3312bc55e9c93891c5946
Commitment
cacd43f8706328586774d4b0230a07741ea468b24a3e59ec9bc1afc3edb46b11
Range Proof
672 bytes (Bulletproof)
Memo
67d844000be99e76813f7931d2f2da8f23cc4b06a6d116cb759ecd2a3eff147661ffe57022f940fcc00ac3f15bd0643088af2692b3afad4e412543618d77c2a6734acaa60f446f9bc0ccbe826f0ad6c1e69c3b31fa51807d1daf5df4d7014109076b860ac411ec26c3a1cfbbe167e79abccafeca80995c4a64163ebd9c0669dc (encrypted)