# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6c8fb171f39e0c4d87ef33254b4c6b26b530c8b780342412b30086b236335f0f
Pseudo Output
36d7660df497356ae91daca26726aaebc624ca32466b986420564b0db3669855
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d6f981370d10e38141beef66403f067bd9e3e4d43c55f53d40bea805e8d8196a
Commitment
7898d6564713d84e586ab19ee5238528df6c992290b744e0b2c8f05b7f57bf29
Range Proof
672 bytes (Bulletproof)
Memo
148c42ee21d990651a75de5e54d230920cc611e903ba51c36a1d7f45cbad1105211a432d0e0d07f92fe1a2b8d3e08a45ea4eeda9e30c15b3b1bf5d042e8e37e01b8807b461ae387fa224f6a09e12a96abe4421435ec493e9b122c29232c7a065c8be9ada500c5a8b7f053c9ec3d720e5be7905d513a7b753f4e8825a570f6057 (encrypted)
Stealth Address
8a2e7c6bbeb1fff1e7fb2fc4c95df1404b971043a2d5484868564e6b36970f10
Commitment
084a8d78e3769f725c1cf8e741aef0b639b591e708a89754616f472281766a71
Range Proof
672 bytes (Bulletproof)
Memo
7b862da924c5412a76172e6bd2a9175b8177bb9835e4d0155fcbe9547a073e96cbdbbcb1e6315e8547bdd834660411279a3611157b423f3a8063d0312d11e10cbb2a5c36efb931deeda717338145b01f45fb1f00dd1b7228dd8839818e9ddcab25ec8fb3dedeca83ec1b505cd48e0af86809c4dc452db8e3e226e758d0598ed0 (encrypted)