# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f64f5274fa41331794bb31ccf652ad5299fe54fd1c54a2ae5a978ce7129e3e79
Pseudo Output
3ef77b40ef4346fb652100fed86e303ba71c8f0ed2d4e6399236c09587ae0118
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
68ec7d76ed21f07ab76eeca15e374c3734cd781a94342423eee52aeda5209a44
Commitment
b06e5278bc6ae50a471051f4da6c20e36366439f0dee72712cf7bcfad0e2c517
Range Proof
672 bytes (Bulletproof)
Memo
c7722dd7a614cd7b3393bc007178efd68ece460ba1060a5150e30860df20bd0b5c9472fffab5f8e2abc2ac47ea4b331e7f5a99a83850194e050999893c8ee8782d0cfb147980c64e15be0754c6d49eddbc52a388744313a295840d1f9b4bab48560ff94c8090879bc36678bdec5cc8009db0bb44928fd3929a56ab9023451c23 (encrypted)
Stealth Address
467748a35f8d7e57314061a77247350c116634d3e02bb355236c532dc176106e
Commitment
9267495d8640fb3f2292430f92baa8840eef2b44ee26ae01107072e3d6f36050
Range Proof
672 bytes (Bulletproof)
Memo
34c476cb758dc2ff4e8cf6fb7965726a189900695055b634e32242df977994b16c673b3e907764048ed917fbe3b82f9f1946e598dba57bc3501683f46d3a1caa12b5bcc89d3bd69d20a190abb574ed2f2baa00df55717ca6041477632d5b949eb48d2499f26a4c49535dd2a1a5fc4ecbdf264bac7a2fc58789ea2bbe81843edf (encrypted)