# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
626da7d8e18a67c042b75d0788216cb213b1066f705a23762a97fe61e4e4df28
Pseudo Output
687da086e578c12b998df5dfaf6807682988a9263b5f72eefd780eaa09403c19
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d4d541fee6e58aca67ecb973532369f605263257471dc8a5251393e40615ae3c
Commitment
56d2c863f7874d0c8be7e51c0ba2fb9593632834977793b834f1db4842591c5d
Range Proof
672 bytes (Bulletproof)
Memo
7df602bbff68dedbc6e7990a1c4a35478bdf583fc24a124d1e8f0ef2fff14fe49567eaa8bb35186cc15a7d180447807ef60e559b97b50e810fe9a91babce53742f404fda2519761d42a1275c2e1be3b802b1e2683d27cd45c8f8e3807ff45f2b932b6528f5696798ba684dfe8284a639a4a036b28299102362b94383c66ecd30 (encrypted)
Stealth Address
306866844e3c454b546b2d4cd7f45ccfb6bab160d455f69cd550e4ead6b3fa5b
Commitment
3404ceb2ac6ed1423afc7b25ea44f634a3bb6fab800e8b92b4ee3173ae14e216
Range Proof
672 bytes (Bulletproof)
Memo
5e7053a47585eb878b68c2c0b503f03f8fe99e6e57e8114764c3b83d2a18ad087baf13f51aa70078c4639fe6e1e2eda5b8b5224cb385628ee2b4d0613eef77b57dd685e7d2114f2d9fd88100f233097b72532ded2d2e2d7d31b3254ac4eaee941731c71aa315364d9baebc73ccc194573d384ea536b7652b17527cb800d80d36 (encrypted)