# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
187288fff3ff0adb8b596390bce740769e6dc8d405abddf4388c35392ca15f0f
Pseudo Output
da442b44a9aa4d277f4a076bab07052b65a71f2fdb4acd92a84d0e8133c3bb48
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a8ad83cbd7d9b4dd6f5b9946f1a2316cb7497cc9fa1d5b527e06b748c6d69f0e
Commitment
d202ddf3a47fcd2c4407bb63505754acdedb1ae08207dd3645ad1f59c267207f
Range Proof
672 bytes (Bulletproof)
Memo
630e78b35c5108026ef4293f432f026acdedcdb9437a860de18a58b57e9f68929843cffc03bf91169e985cafb2f7712885d3ef8707b3981f22b1cb5a9f53308a25fd6332b4c93e57d9a4a72c8764bd38996b17f9fe1bbf46aa08458b4f2da991279b3cdfc42658a156b10292a75fec21b295deed001fa4970c176b0bbe0743d4 (encrypted)
Stealth Address
80c353af6b689e14c816238729a6301f447d5b40fe533dbab9d218006bd2fd7c
Commitment
6051bdb4421b94a0e0a9b78551077781d8aa6629b3f2bbb1f4d608abcdb75c70
Range Proof
672 bytes (Bulletproof)
Memo
96bb13658e4b3fb6d6045cc4ae16d8c3490b48adf969ce6ec1688442aa004365beefe0dae707e2c17759ccd65277a24cdd5e60fd70a769a9cf18fe5fd0e9e5eb39f2fccc71f2608d7db37b2daf115fbbfe11291246d28f3b9970725df54dd628e39b2f2cdfb8d9d4efc6e2a645264ca46b500e47141129de67473f43d61f20dc (encrypted)