# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6a566b83260a308828e983679f268b4f5831d3805a1b5f94cab6503ba064a56a
Pseudo Output
144151f66010e2c8391ed203af8b72f9b5e0501500ea434f342f953c98c2dc4d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b2b4cf056b369687a8f068b3c840010840988d4edbe3ea741fcd0407222b226c
Commitment
96ba228b10800e0b5c8b74bcc85fe81e349ffbbcd819cb21eb239af53a79b270
Range Proof
672 bytes (Bulletproof)
Memo
b91724863ff5c29aa39e88abed4dd4ed256e709754b9a4bf2bb54c31da0ea949a6e13fefb6c6a3d9aeefe0e564a3bf7bbc1185476f14028c25124ee51f37e7105ac0d385687929c7b343c2215639d8d102bb8be41d01968b35394de3a116c36052e6f53957263f0f8c3d34d6c4a415f65a5d8d39d089b143071b66d9f1159888 (encrypted)
Stealth Address
3e4b5e1f1c19b81ceb3fa43ec9e207a234f8a5630f1cf9db6013282d78514565
Commitment
928d4fa0139e858e418d596ff67ec707babdc3908eef80aaa1084d3345248d24
Range Proof
672 bytes (Bulletproof)
Memo
4344fd3723f88ad9f08c0611f284edbc3f49590accb37ce7ab3375bdc4ca86ceb9f6f1f59bd7bb478170e44dc03bf40c5a47eca4844155f60905e61ae5d9dedb1aefef49400f9898e2bdeb3dee77f8821ebc68ff38a8f9b3cee987d40030a3bf66d8e28e1231b5b2df8760b5af922abc6d0ed5110b91c4c279f890a03013c624 (encrypted)