# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
18ebc875aa52b55df1bcc74d7fd8e4a454ecc10d22e0a945f4d9ba733c67dc14
Pseudo Output
0ebc1f1cb6b8c4eca122e41d0491942e081acb5da38050372ad7855c4f851270
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c844138163885fa10b6893e638eeb103d9841d29c406f223c6493ceac10f6a2e
Commitment
a09c4d2d8728d7b80ff9725bdab6a4b574806caf795b41c9da3041a67085f755
Range Proof
672 bytes (Bulletproof)
Memo
22575ee4b7e314806ff057d5e91303bf8ea5d791bdfc03d58e493f2ef2021bbf901872eacd7e7eeb716415a00fe05cc6ee37a0f60216bec0a68acf12b1d7713c3921ac2bd8387f5ad22bb0da4bf1dfd9232b79a290a61a2ed73f556d06925c2e9895754f688c270a851f59190ee9f0acf94305ba8f746092d4434c350e0ef817 (encrypted)
Stealth Address
500a905dce6e20a1f75ee4e9a83dfea47e753c621abec4b2d702b1baa975a43b
Commitment
4af48f516bcdd40924b2bf27aab5d8371c10706928cc6391211a8b22055f9b3b
Range Proof
672 bytes (Bulletproof)
Memo
ebece4e6f6edea6864463e8ab66dfdddcdf2c684bfdb37e12c54221fcfb5648aa65f4cdb64ce9c01e0dfebd9456cb122a68be23dafa449fb2ac56565f71e8e34c16cd273c933d7e078a3714cf2864d0f6854ab299098e12d443f891a4fba44b9b0bf108279b137680bea3861c12fd95b36c18b06b5712ca7903eb69d4e45685e (encrypted)