# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
64987e3242471ee3ca31c23f81c510ce487e4a69730402df54033952ec5b8446
Pseudo Output
fae827091ebd6fa7ecb7c80e633aaf849bb65989924a682c269ec9798dd05106
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
36af7832fda51a4a81e64ef99cf209ef127713576b0c340e352d02f21f6f034b
Commitment
da884f3d0cfe8f80d201a0b49b98636d4a64778ba9949db418434ef37a6e684f
Range Proof
672 bytes (Bulletproof)
Memo
088077254f07378f756f5b979701c703912b680359580ad4ec820c565649dcb997502761325af716b4332322fe6abf2be130be11a4477e574cd63042d6b06317a70413d56bfa852918683dfdaf251ff7330e24518c6889f8c0d0421219876df3218d60f888f8e18417f7cbcaa96fd9bf810434c90aeedffa289c11dc61911ca1 (encrypted)
Stealth Address
142890e0f9f710b8fc94d0776c7b9e833843c719dbe423effa2ce86ce83ae93e
Commitment
ee31ea714a5ade20d2c450fa78971fc2881c8ee66fb46fbcd6f0072f8a82d927
Range Proof
672 bytes (Bulletproof)
Memo
e2f2c0bf7e0584bfbdc5db8238fc60e9548a8d31db4847c623550176e55ba6f117c3d3a389c59d53d7b96b3962be2ddf99107db2aad99f4e144b0e832a65dbf44696ccf2ef576faa076742c1416f73dda236b5e12ec7d7c65ee3ef589f7af89982a44e3fbda9776db88cfd95b9af869a0ded24a96df39e2cdf9c1bcb5de6652d (encrypted)