# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5a7ab16651be432a9291806da1ff1e29aeaada92a8d4c736508ed19af18f571e
Pseudo Output
4209cae2ad9b3e81b1e1c5f4f3f81217ff3154824817f18e7e55bf5ac787de68
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1c8f41e359824bceb19b7c42da8c29eef8c9b6aa2d39c709374a9c7d3e39dc4e
Commitment
e459c93a660cb4f35f537dc25bfc33af508f75bab3b7b976a94accae0608f15a
Range Proof
672 bytes (Bulletproof)
Memo
d3de5c63205f31882d6b76fc4797158753706880a01101c08926ab17f1759020ed54055fc05471c2a44196ae6fc933e5a2d2b8347cbd06c363d17e6a62175767edce5c7e5e999200b6c3164158ced2b89e48cac2c1b19edc36f9e813d4ab83599240c0a81c065aea35c7093bff3e50425d9f2065d50434d6bec333dbda8bfcff (encrypted)
Stealth Address
0a0a3692dcae345f63225bc46687e65d905ecd2ec101f3089ec174b68b455127
Commitment
988b307b4f1390e1f8cc8fd7a6a854105bbaf659035c998d6f0465f7bbc23606
Range Proof
672 bytes (Bulletproof)
Memo
5b48a29f399f6846e3e18a0b06481f95dbb8bcc39b784d7ea91e93fe61f1f3571056f315ff8a6354a6a5f602083618aed55ef34121c5d4b5a10536a8c770cb027afb7299d63852a4dde4e61ec9317235516ba6ec6aecd9895594d45d7d6b86da33637f1893a9b7055367fbf27208df754741b28dceead28bc606649f98382020 (encrypted)
Stealth Address
541ce7c64e3ad303d5cb285acbe59123e103969b7b19c08052267d5b653f3059
Commitment
1c92af94157bcd3e461007a260cab4594cf21f980dbf16c362e97505ede3a909
Range Proof
672 bytes (Bulletproof)
Memo
28e9ca4af828f1c144c17c08c001892c5bfa2f6d410c8e93f209c9e9c3c037eabe2323f55a86a796b73e9a27ed9d1ff4d96f4294a0261c9599957f8b5b5a262ab4fb2dec0528cd019863ce8f4eb44ea8530b9c10490d8df8d2be694db3d658283aa8cdebd3740760e4cbc1cc6f178066724ce58bfa7f2e9e3f892b66ec61c2e4 (encrypted)