# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
94fcd31f2be9b14086a79ebfd8715339190c12106e29d2d4f2e9ce9671c46755
Pseudo Output
6a73d7e21cad5f54cc70d2c255100dbd33c63bc4a2b043bb4c7fba52bcadfd13
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
68f8fe1ecff1b0e8c27525565c631234263eb26cb44efd61c47e4f43bfc2bf1c
Commitment
d0cf65d0b981d7f64d9ee4de7edf17b5f9c313daa7f0f503ab78650eca9ea249
Range Proof
672 bytes (Bulletproof)
Memo
bb2fc5aa3be76ca5e4595846dffcba2376e5acff66493bd18a00cd811a526bbf978671588dc0b411ef228dbbe1548fe30de72257b97abd67a687d8ccd26246dcaea26a9d7cfde3ca9abe0b5cc3a310b39f71354de77dfdd1959dd5af7db16c4478832117977a38ec67722fd861bd0b32850255f0c10639585dda32f7d1863d0d (encrypted)
Stealth Address
0c0130493418a5e71e8527d3c888ac8f8c37e5b4776bdab0deef8408220ef77d
Commitment
a2e1b023bb5d8db5516526a2de505a4042ef7729d9408bb735afe84eb0b59700
Range Proof
672 bytes (Bulletproof)
Memo
fb5df19d2086778b794da3973985dc810dcf4cf3ddb34f3eeacc13275e164c64ea7fc9d5b8b430affb9b8221f39c7fec87a784062acce8f104a96f043346a21f05cf49273d6e656b4ee71596feecf39cb53c9dc582e75b371c1321ece4ecf1da6c00d8b57331e37052d8bbef4ffe6674ec4c605ad9ca64572fd01fbe1badfef2 (encrypted)