# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
06ab9c6e852908ca27644efb01b68012729badcce6cb32e3f4f56dfbd66dce39
Pseudo Output
680a4ab1974fdf70bec80144cb6f95c553392cb016c226312ca923755be1c721
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fa4505d9226b923aa75ba3ed5c6a1aeb62f699530e1fa39d51001f949e002919
Commitment
aa4130baddf31c4b617953d8938879fe35a1ed5a383e6d8621006ef88a939948
Range Proof
672 bytes (Bulletproof)
Memo
2ce4fd2fe7945ee5cd168f42c797ad234ce8d089cf4638405b11473464d33f3ba3c1673a6614451cad6e8a622c8bb9f266949eadcbd7168708a1af3b35e32e8a3d8ee344c0ddd8addb8e9ac98b392c8132ed015e55a9c3875f5a85605f5f4e4c180d137e4ac789513ad9feef210c8836d89f303a0143fc13e35fd27a22169641 (encrypted)
Stealth Address
106ecdf0f4d8e3fce11b681edb655627c94aeea008267d7524222eadc8234d63
Commitment
d0454db8de602f4022f6cacfd1dd1c22900474773e67abbebaad67623ee02c17
Range Proof
672 bytes (Bulletproof)
Memo
e3d213a4a1719698e1f4382c509569f7161163f38756b0d71b37af6ec5cbbed4ac1d7339ec89b96c4097aa201491b3c5bb0c9d0c82d3da0d08467b791c177fed9a45660bc41e1755c965bc4504f9d7b6ac54c965b17a70c1a711a8eeedbd81432758e0a6120ecc53692e7f1117bc248c650eb60357e887a4e1ffd590730d21d6 (encrypted)