# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
002cc25271fa2384b9b1736182fad0753be0ba4b9499d536f0e431fa633cad1b
Pseudo Output
822d42081a25991c6d6f69757a06654d1c5adc9393b793c66fae2aff0740df63
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
28165564f63e0d689583e49568b639486f119bbacf7192ac7325637c51b8fd14
Commitment
2c97ea78b0c4847b7e01725045adeab409c3e4bdb088444c4564582f4ab16362
Range Proof
672 bytes (Bulletproof)
Memo
af34cc0e7cc812ae31520cf590b7ad99bc4c0053c1f64a299ee778b11185222d74a8f8c17e25c6337c3cdbda0f78026ab1cec98b73b183010d7e18c1d597ab680d17bb08314268e4dd956e59735313f29d88b3f761f91cea72c763c64351a7f5bb630e65f649c8b3553e5616ff5c60018d475d4fafcd369aad74cc26eb436a27 (encrypted)
Stealth Address
661570023e945ef2362cf5b6d41f7687c18738568158029586fd305efa5a3003
Commitment
7e10ff22183323f5e6d9b9e528c9fc56b9635736c7bb24a111fb24c38225c014
Range Proof
672 bytes (Bulletproof)
Memo
44a1f185dc627768322cb5ceb9baf5ddbe0712951aa0907dbaf2f0ee3a784f0f877205917b2dd1b5f10ade31e82dafe3b1ecb2f0f2570e821dbfbeee158dd7194cba5dde2ac781dca108d56ac196cbfcb1553bea37740f8783b28e857f8f5ee689b2066b22d25d9c0cda0bb30169a33e349452f62bf196d0a1c3fb95ab390a29 (encrypted)