# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7e6783d88c779a910af2a3723ac3ed131957735c3880466411550bc6b7127147
Pseudo Output
22ec2a6dd453d386dfd93908a1573dee0d8cff7d221bda787c6724c18d76190f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
06c2c26be7b53115cdbebc1e416318d381eac25dbda95722c36f0b07fb40615c
Commitment
565589ab994b670c5bfc8e42e958be7296de4177411338f434d7dbd9c7e6a302
Range Proof
672 bytes (Bulletproof)
Memo
833f198358d62c2262cb7d83db8f71d0ce01b45fd1e82f0ddd684d7e9bec549c213232749b00810abf5afbd9728b7e82cbf0ca1a36e62b6d55f89fbacfeec55e96e261f4aff2b6141997e35eb676f16cde27ea4f52ce654aa62c95506923af0610718b0d389972c3657a175291a7f07dcce2af8a140a03e68158a4bfcbc06915 (encrypted)
Stealth Address
1ac64796cf7b6832c69a5a9a6e4ee080e839e574172c9fdacfd37e8a4bbb396c
Commitment
c4220a3d58e58f6350e2787eec1fb9c7f06b719377fb971ad0f369c75e203425
Range Proof
672 bytes (Bulletproof)
Memo
c7441ddf61cd8a487819fe84251683c3fec006468c922031f3d08310e339fd860a59e452ace828a7d6fb08e180924de7d0c0fbaf623cfdb1e12d1c5e9812884f2ff35c38fa441e05066a5ffbf3032b73540c8a08530f89478d920b69ba4cc1eaa8d5e5fc4f44f1c2f391717249f6ce66341fef315090bdf5fad93c52888588ff (encrypted)