# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
165fc80ffe5f0f4cfc690d42e349c1899bfa27b449297bb61acb49c668ecd868
Pseudo Output
32228a574ac728d7570dff12ced1676353f88a72e2c1db84f55dd5c8142af327
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1853b89655aabaa5d8652fa5b4a752220479bca2f5ec686dc7221bfced057f37
Commitment
d426f14b80699435b6d284a68f2195879aeea9f6b27b5c127ff90882a412a402
Range Proof
672 bytes (Bulletproof)
Memo
3010c2511935bfe16ae5be80c9c96ec24a2ae05d52f4ae6a9924a2ba930e12390b02a9ab9b9e5b6cb995b73310cde91e42fea17323025cba2296a7a319e52609566541575f01bf77a3213a3e3534743b587822f37fbac428a20a7c1eca0fbe5322d2fb6bc9c17631c2b40795c7892d92de56b2a8a820f8625dbdd94890608487 (encrypted)
Stealth Address
bcccae84ddd2e81c9b5e6995895b7ce26993ded58496a8164b5b01f31784754f
Commitment
b2645def3862e86c8d096e42587046a4b49d08aed057d1d330045f453987ab31
Range Proof
672 bytes (Bulletproof)
Memo
d2bfa8441171aa51515fc0ff4cb8a871a7a9ceca3a06d3d6316ee006e6311c5948597dade9df8afe54d5048ff00668a9650151882be667e6278693e09e6ee97b99a2b4f090643f3dd84d90806eaebe0614df3f4320bf83d33c7cf8d4d1a6044176581bdecf8a1c66786cfebc12a663ad139c28ff3186c8ad962aa431f6a7aa1b (encrypted)