# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e65ccefcbfc078271b2631beeb55da34fdd3a23b9115c9ef2054d9f516b32a5c
Pseudo Output
16bb5cec8a15d4f6c13ee453a98478185b97b4fd90f819e19c3ef830a81c581b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c2550fe5d4b8333d0daf1f7f7cdd70de402d1ee918cfb0cce99685a1c36e4068
Commitment
5a162d73d58b19843fe0bfe02f64cc0dfc1c7662db6227d246ac108b1627ef70
Range Proof
672 bytes (Bulletproof)
Memo
e4a5801c9275452338810bb4213c66692eaf100a4cb0512508ce5fa11ac1597c52747f6560816d03b7cdbfe1b8bf551575f84511ec1e500befae45a5558ffe01d4b7b6daeb36eebf627b5e2148c3bda0bf7d3e03f5c0ecf262f490f38fd53a2bd763247fcb4fc6bbafdcf38401c1664147b781cdfda02ae4b46b5238c151404a (encrypted)
Stealth Address
b0d91de43e9b6f756b0d59e83e80032d4db47abd7cb5e4be5532e23be62b3d51
Commitment
f61465bbc7fa81750a0dc2f1dabf0706d006286e421bacb177bd10ee28e5ff0a
Range Proof
672 bytes (Bulletproof)
Memo
b06010dc8e6374d273b8b06db879c7254ebf97631330d5434b5e3cf34e7636846c535e58916b16c70e229e5b1eb1f5c22d62cf62b3235cda5fece50fb924725ab4ccbd82029701c30f46e932d5895665e132cc4d5c70102907e9cc2a77ee97fae54c1e31a004e021d3e961db2c28ef3dbbcd2d8d7c4fb62949b94169e6d75e77 (encrypted)