# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aafae6397ae7ab019e681df388f33826d9024056d018607078dbee29ce545c76
Pseudo Output
6c9ec4832d0c9a155bddafd796a9863207e9d3fe39a9ae7b668849fca1a2b34f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
68a2f969ed67506bbf45b689783b439a698b005c15943812aa770449ccfea62f
Commitment
d6d94c2df9dbcbb486041cf40937196f726b591aba88851e8b38ccdd8abd0800
Range Proof
672 bytes (Bulletproof)
Memo
f618dc91da6eb513588c5c5915fc85055f8a7a63ac0193c39afd7b95e115645baab7741c7f45a27f9f618b855bad604398ad2e02b155f1c4ca1755d26e55518831f5ca0dfcff0bbb61b6075229fe89918337b69bfb0884f57b7da722980b038ff19b125037a07a0a6ad44156720b74fc4fefa8632c6a4059e1266d8424f10152 (encrypted)
Stealth Address
6a4a0ab32068c2270fa94143244ae6894e295b77096bcd1c9b20fdbb38f31275
Commitment
24821e747fad1dd4e89912f4870d4455bae04250dea8112ee7d991041435b116
Range Proof
672 bytes (Bulletproof)
Memo
b8f78bfe48a38f46f877865c80a5a198b49799dc90905d277f46ab88606946fba1125a5a506a38c0de00cbdd396a849286c934090db657d0c0855dd6d178e1a002a6a10b08cdaa7eab125ea77106589008c9a8e53bbc2f447c1b9883572282035da2cf831ac67c518a74d21d8793c2bc2e6d023c8292778c566563af51ac33d9 (encrypted)