# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c85977a93063cf0006e66421a284e2bc3d5e8f65a9e0043636649b3f1eea5219
Pseudo Output
be0e6563a6566039194396b58c8b5a1727a776998dc9d86650ce68e1c9825001
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5c75f620cbe8343b16fdb26dc65478c119b03348749002a936138e84486f0004
Commitment
e8395922c1dce38fe2650c24e434738cd1c05cd811cbc080e52c00d7b7943615
Range Proof
672 bytes (Bulletproof)
Memo
18df377ac56eb78275e7f96a326bd5312cffac5d93316e4b817772a0d12b76899f8d48f7e14d49d8dd4bb99074ad2645f4be959988539bfc7ed71c42cf595423c65c0ccaa8957b8a8a1653a152625b36c6f1c466a5499adbd2cdb91f161ec7b91c883e07867d567db4fbef57fa1185a62d413bb9c0bd9cbb60e6f4bd9392b460 (encrypted)
Stealth Address
a6aa25a8eb51d488313f03b8643d942124e3dacb25750b4e1e586be88c805158
Commitment
26927c1e16f4bc6c6a01400ef08c56c395c7fe9fb5954b7cefbfdade22417156
Range Proof
672 bytes (Bulletproof)
Memo
24963eba4c66187b0d5c4f13586e84c797449206bcb79ffa3cc8770d50b44471c0edb05395c2c6203e56cc431c5e4026ef548ca210c49654b5d4e2c3c9fa5c0331973e9697fbd418035d51de69c27c2bfb1ef8d1899876524288d205066e3880a3035755a8ab198b0b7fa64b19223ed919e1457dc373db7efefb489275dadb5f (encrypted)