# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5082e6f492ef948eb2be85d4b324125efc66cad813c745dc19841eeccf182d71
Pseudo Output
545b88c9402a073b611feb9676033644a0a6f1eff9004490c919889de29d5470
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a642db00944e38190e3a07ecac4288e00185d3fd77f2be82194dd86cd8af627c
Commitment
b86d2a6724ee59128ceed2e8667db904439a89dd3e83270c9dfa6b0972753d74
Range Proof
672 bytes (Bulletproof)
Memo
e24ffa7af83b5258fe8300d4bede228327c012110235b540f4bf13a57f50348e6c8cfee9279ade6e228885f7ed94dc21ab2ece93278aa5be969f7dfa5dea53aca9cf7e87d64cf582f9468720811615976f57faa416b482884f208fd10a8e34cd3c2603f9b08cf912b262924e810617a069360386c01870b8b1dac8a1049d03ba (encrypted)
Stealth Address
7028952fc873d0d4c582bd7c4af53e713e2e6b93639af69068f41f667cf42430
Commitment
ccc53530de31ead4bb15648447b2e08e6f1b3c13dc513d67edca14e86128146c
Range Proof
672 bytes (Bulletproof)
Memo
d833af710dbe84158c29c59555f555533982355cb96e000eb6a1b1703690f16bb1ad40744f9fec038dc8dc53fe5285a645a3ac6f91c832f1a3378bc9afa3690008c21a749ace75df07c7e8ed5caa23a649870aaf9d697520c95f7cbe960594ca7b3d883b2f8810727bf8388fb72fc63a31cc794246527d6ffc01cf0d82a87ba9 (encrypted)