# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
26de64696f28defaee130e24e10dee62eadddf29cf9fc0a0f06942da80d99737
Pseudo Output
1ea198108a58223eddbae37563ff1a0d41064598544651df93678f02414d165a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
523964529234028e3b35afd92f01b9b6c092816c165a66e2fb74777587231451
Commitment
a6a546da0d3f05132c4ac133b087234a7aa7fa9912adafd1ed12e327d639fa74
Range Proof
672 bytes (Bulletproof)
Memo
c6a170ae1c90023cbf89af97edd5dd2d62dbb923ed9529c40068b3230faa504c3743b06e256134bd97d2fc2766ae0e7dd95d69cd47abc73be0a28ae4f0fb8caa7c877ec15bc94f067b92a523eead1e34479ba1a2c012d47d40af84189dccf957be4211bffa1c1ba2184e157764bd03a03d2b14100f962e1fdce033698130ae2f (encrypted)
Stealth Address
407ca1123b693945809b9abb42ba9ceaf04f42d77ce806b9717b89957ee1f976
Commitment
60ccd8f7d977995efd87d62d0acdc13d8359572620ee419469fdcfaefef98562
Range Proof
672 bytes (Bulletproof)
Memo
3da9e3cf0593f6c32b183a0dc3be2ace35e413445edf6eb606d34b0b27bccf57ef0e98720c8f3eb4560de7f652cf9e5a8be511dc8b287c480a19948b220c515b5c44cf4672ef7fd84c9473bb6a2cad34005c05e95c8eda62603ca09ef4c8b6e664f4f6c53b10e5ef7ddfae7b27ff0882e417b7bd1ab0e42dea9a95cb6cb9dc2b (encrypted)