# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6a68041f6f88678f1576744d454b6fcc64fe02ae2728cd0face096733837f260
Pseudo Output
aaf96db3910aec20bde173375c4cf0109dc93b53f927aefe3d3566a9e2b3ee15
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f410bc72f0e2a873124e5250dba9e9f23e877c6dee43182cb31439e240fcb376
Commitment
b02448713fa1a872912d17e38697b7080eb247bc83cb2f05e331dc9985161b42
Range Proof
672 bytes (Bulletproof)
Memo
ec8ff28346b7c4100faab8deaef3c85777c37f9e826c42594c324ddb9db7b942c38015de678e45de68372c3f543b73fe9dcd9788254c4a6eec10f23de4eff113922a70196ebf4d3bf4c1b1b580f8d8f86ac00fbe0632346aa534ab214ee24bcb802423d840c522a93b336e2c04f563ba1e950cc9e070a235e7955df22de5620e (encrypted)
Stealth Address
d44bf946dedd0cba48508516788402079de1df4960ba8436dd5abe774a0f8f6d
Commitment
4c44343f96738f4c0210439372be34743b1320e82325b6830bda169750d6840a
Range Proof
672 bytes (Bulletproof)
Memo
5e715b736f08b49a2bec3f9b5720472e899aab26a696972313055eb721b472cadf6579be75c698906028554d5777008f0cfe150d4a57770e4d4835cd4f96d0895de27037159b68a4f6a55a3dc83ecd034e38f541e16dc55dac39aeaa135424564ecd3837f88ec89b41369399cf4e1ba7a84c9ca2003c35b1be723166671cba78 (encrypted)