# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5c086c2e8e4b2365ae69f7a5a1e994a62b0e9fc4a28983b6f9200c65b69c253a
Pseudo Output
44a5a0d3211967fb0877b1b6143d165e540d6a8114843f960b998c03bfcdad37
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5c027bf7e00319bd4c7dbf460cb4c7267c191ea46b1ef17c0c711e5ad09de269
Commitment
8a36d74117686bd83d206646f42e0ca2155f33506376a807966e7a7dd2e2513d
Range Proof
672 bytes (Bulletproof)
Memo
d14d5a2ddeadbcf420d62c20caa23637c9314b1eea20865701e446bebc00862bbf8700aba22e3c51c6b853ddb109d3205ecb37e7e4249c4db85b6962a675a82c29438824d7b47cdb378092bb3dfcb1a8194ab20b9fc3380e42069935560ad3bc27f6ed88811ad459dad2fb30f0e0f571ca4fc1e715f50e4be6aa208dc042a88b (encrypted)
Stealth Address
8a8e48e3549559a2b764f8ca9b82faab732b64434c424664fc59b2eeeae61132
Commitment
705b4a6fa204f888747e9fa51b97264c11fc1333d6302ba5ef8e6e0eb6a52712
Range Proof
672 bytes (Bulletproof)
Memo
e3273a73832a67dfcd309421332e3f0703169d9d192d3d31dff732dc325ca6e8db3c1f0d2b98f2cb959feb3b8740c31e429f0a7ba209a6ceaba4d9bd6d45f716fd7c9314a1841676872e313080e8bd9d0bee62674a9a0480b5770582e5e386f9d76003eca63252c04ba59549705c04aa9be58892f4c3d087a720ae7e4ab768d5 (encrypted)
Stealth Address
8224b583af1b8192818c0545ab9c4f23483de119d76f5875cab5cc77530b2a43
Commitment
ee34940e86a51357596b24e8a9e92390454e80cf75cdabe9fcc398a91be9a312
Range Proof
672 bytes (Bulletproof)
Memo
a98dee7e7c2ba2c0bcd3e6b65530926e9fc3a38d4d567cf5f4ceb65dff326524682ac07b91f069f633f4b9d4307275a7a9495f4eba62077a75ef451e51800527efd925083c4f5a5232bbaed047259a0eace135eaeae5d6033d65ee9b09dcd4227755c0e5fe14ae71f1a7a9a616fd209596b7c7963677fa32ad6317c78acb5f40 (encrypted)