# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e02368c7dc7b15957589365cb8c651ca71051625ffecb02b77f79aa3bcae5d0e
Pseudo Output
0c175db9de4fdbbd2cd3bbbe7f684a8a5e481c4da792575e7f83760f69b00108
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
186ad8dfaab19268a6c3e83f1447fe95c3259032df078816fa6cc1567c6ab678
Commitment
c4e23fedaa5a3e8150a7ea95d49d533c5f0af4e11e5579f8ae668a0883069245
Range Proof
672 bytes (Bulletproof)
Memo
57885446b63589a02432118c228d7cad59c4cfc892f4fd1b1ea9e4b0067b3a1724a44bacb4c6a38dc734b9e73e9be0538828d29313d7377db55f69b538730533fa6705cc1a0fff2b30d05fadb8e767be57a4d1abbb435bd3efd405ca7274f948b168e48f05f8f17137f8bdf86a07b64a9bf301429fc0b3212385925ea4d3c3eb (encrypted)
Stealth Address
581c8772bb91b5bb614c6bfa4329a0a1a2de678e9a9f42e93b4184ae7c6c692a
Commitment
5c333f525873654f6e554e52e5b5461f648c1106a4caea57110c95d80ca95d63
Range Proof
672 bytes (Bulletproof)
Memo
ed6358ccd85e4556ac6b95b345babae6d2e4b756cc88e25238b70b1482661342ab9995ccc03a93b98464f6fd78b55308b19aa12bacbb2d4a57affaa083c61e92a692d9237b9e6e4ae90247d70354a31f773455fc716a9e5e5e6e378eea9d0b8d28b452758e9de23511e02be725b7e2cb47ad67537abc93ab19f843cb65313a0b (encrypted)