# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
225d584e2883d68a44671c3e64a429c7788a432179fa36dfd5efb93fa2e4f31f
Pseudo Output
f21e830d6e16a723ad42523ae9eb494305c56fa6c18b4bdc7bea2d16e6b18e22
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
18f4b705a62106355ce296b901a022728626f593178159b93ec06215f2c85479
Commitment
c65594cb2e17da6e96e1a36340aa4350b72ddd89a7e527eb3ac7c0046abf1d0c
Range Proof
672 bytes (Bulletproof)
Memo
aec5bc4c9b77296bd4e683c8e7b613d98a1a540a90ea08e372dd83bec04b0b4074e507eede1ebe60229da78723b3164bc5241111a0a66ca5b2199bafdf879325da8a8af8cbcc0dc46046986639ea51b9ae8cd5ba29afd72da7f2c92b726bd86f72d0f20ce14aba05a9482a949c89224497ecbbb198a183435df5590d5b271b9c (encrypted)
Stealth Address
f496aa395914838c22412b99f17bc15de7b78264e116785ac4ce94fbd2a88955
Commitment
3a85886f07623d9d8471b84dd57b9f8151bfba3f812167e28e9abf06814bff0f
Range Proof
672 bytes (Bulletproof)
Memo
3f30c3a09ae475dcc3b2a8c20721d720bb5f86379ccdd5ca85799f8b77b0f23df5103bc6af3eae1e2e3c806c38f24c594eca96b1cd566875ebbf28eecab3cfd298895c8586bea4dfe1ebe598e2af3d7018f4189ead477e93e03e9860551611c0184fb67ea769090424ab210f50644a1e1ece319c712207655945b429a3dd4312 (encrypted)