# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ba6fc9697cda0c1651173404dc25741df42f4a0babf0d73945f0a523881cc77e
Pseudo Output
68d160cbdc1dc9c7669945dcd7ac5d2ebfdaf385da7daf65febc9497b3b5c033
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c23a91595791adf7df66e53797a359de071b1ab4872550329efece1c38adcf72
Commitment
8c88a8b7ba3b784e97fdb37f048a644099849f24180c886f7e8d96c4ab76bf23
Range Proof
672 bytes (Bulletproof)
Memo
8694714d8e921d3ab816c1c7dc3bf63dd809ff6fb72a4bb62aa455133930b391f13ccdfb073646eb8463a8fdf2b2dff64e6e3997586126e0d0de63726121873fd6c23f78470b4186bcea2f5df61f8cbd11fa95f67ea9f25cf37c558c045e723bd97dbba090986f87573a03eb8d005d45ff984db0f5438052848ee70147b0d446 (encrypted)
Stealth Address
b8d70d657326026043d011dce920dda22cde452af2e3eefc7c24196bb716fd2b
Commitment
1c67236a43236b15e3863c329c6045b0827603c89a7b38a33b5d10bfba051e5f
Range Proof
672 bytes (Bulletproof)
Memo
f491f554f005d89f0b806f86e159aa72f0cb692e38064a37457ff1b1f18645419bf923c52041109aa0f638954a0b9df49943c0d94caa3101314bdc4d68e41bc38d43c0562ee12da18e9ad556a05ca15784cf6a9c72e28f5caf7b040fa596672a9237434473d83bd1c045dd11afaefbc9a28b91331b656415b88a89d722e7b6ad (encrypted)