# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
66b1dbea42c0a790813fe552df99ff09b27669d94f3aa769f73715c176f56e47
Pseudo Output
16387826253d223fa0fc1ea507085713e88e46a2153b289a7a18ae55994a3102
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a87985ff8909284422466172955300302f78d2409d8a39fd91527938da97880c
Commitment
3438db3e399622d2e65b791145160bb70e2a66a5236d08bd20da19e5d6c4d931
Range Proof
672 bytes (Bulletproof)
Memo
4fd0bdbdaf1b8cfad07be26196b5a2aef36c0b9a27fd99a82dd05a2198beb544f2853e1a9467f1088a9e6ddce92e93b613589cf594dd7e5f7ede616c962b64a88d377ab9bb98ab1ddd24527afb56f291c442b4d7662dc20bc61525929f024aba9b728e78a072e4e3807c8e4c4892e391f852522ec76e5fdf8a32b993282b4e22 (encrypted)
Stealth Address
68f7cde863ba5ba775ced8b200cc24fb020c0e4a70e0d7944f3c7d051ca69d35
Commitment
1a5a9b73191bb5cd3fcad9cb2487e294a491a30f88824dc25dc97067b6c5bc2a
Range Proof
672 bytes (Bulletproof)
Memo
f47947b29cea06013a6266fa9006860c0709f3d46017de2ab7eef1c2e2856e0073543d69b71b3e1089e6b51be76cc6b1aa23463819c0ae91bfb9788610df0ef1a12a20e201220fb60c61b8a93afe502936eb671a79dd8e4fb84cc17bfc54ca08455d6f36418136465c9051b64f078e933211c423bbd8d9d8e8a9a37359e7dc3a (encrypted)