# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6e8b46e23617e63294e534d03842dc0651ba6b9adb5a4fe238633f827858007f
Pseudo Output
042af518fe760c9be20aaefc988067c6ff0ab4766f0d71065143b4d61720c42c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
94546758674fbdc86fb914523770d7087dfdcbb1d7e377fb32e8b8a7a52ce718
Commitment
02df954401d01f9495419ccaad7f58d9eac59c07e5148f9c9f5a426dd9d6d244
Range Proof
672 bytes (Bulletproof)
Memo
6ff095024519a60a66845dc86cf3a1790d862c13778e4e3ea0751ce6e12fc4e33ac4bec679001e74f816bfd48df6b4337ee7794c7e5840f4908dbdd9c0024d708cc117948fef98209c84ad181a549df81f6be8c062153acbeedc7dbaf86fc070cf17f1753020c667b920ff19234f54da1b5d90a08e3bbb3a28a300f5f41a43d8 (encrypted)
Stealth Address
da42a50dd899d187a77126a02e0902c99540a41674e1889173f8bc90ea82fa50
Commitment
2cae317584e77e92e5a1798a30625819fc0b89c4954d0325fd7223f8c8caf757
Range Proof
672 bytes (Bulletproof)
Memo
a188a180975dbb4b8673539aaca70a13c2dc2d39bbb369eea2736784171338d5910abb71daf4d91a2c9ff4a45f6f55e0d3003f1950b3038d61f4c2696ab621ce27d9fa22f6b5e7c7932baaa65491d2c7ccc2203945da30735e991863aa0800f89066e3d8cb3a9e970d6d2dd0780e169f80b79a0b94d7fe44744dabbff4ea0252 (encrypted)