# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e818f70715e3d34bb336e9d90ee8e2c36952a54122132062de6299d50d720510
Pseudo Output
8256a1d04bcd0c91abfcd6f464ea0b227da859991eaa115ffcaac93f16d1e926
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5297a539d17e5ddb88ee0ea6039b1ddd691e547651fb11de8080b6f77fdc421c
Commitment
74ea7935ed37c3cbfab53d5bdee290d1b76b119d20a282141002a164d1dc3341
Range Proof
672 bytes (Bulletproof)
Memo
5078c817d45e050450d2e07f20b52f5774310cb2c62e9de3cd30df9659ffd1a22debe9f5c4f723d0395768d0869312e795d7148b89f67e844ad9824adcf60447afc490978f379ea4807346698fc890a3e5a3e8fd255d361573c1bada1d6aaa6b143a5bd8ee8df2c5fca65434af02c31ba7b00016cd33bc8547b8ce8577c27fa1 (encrypted)
Stealth Address
60d18f4b50ac2a472359b4f95a801867165eb25ec2cf62d9520b79e8eb51ad3c
Commitment
b0097b558d61fc4dea8a904b0ae9a4b62399631a49f232eab878d91cd0daad1a
Range Proof
672 bytes (Bulletproof)
Memo
b056c4b4e6bc8a0f95d3b01d22ebe290e0c764b9278f7038575e74f246b94d98422cc05139ac3437733842cc13be69c55648b83d5d27da70abb7b7e40a650e08ca2c6f68804dac36cce7ce361c2dfa309ca74cd0c18abe272c584c6365c1f417ab0ec8aaa3b62545bdf8d2f2bd8b563242b6c422233fa67efcd874bdc905a3a4 (encrypted)