# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ce635a7267fcd1ed97ca774496781cbbb3318eac77aeb11293a24b5dfc1aaf06
Pseudo Output
92034d97e56ec4313c7162034c7110622d851717b8f4d97a1a670398468e7e09
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
70ffd34ad090c43426cd9b8f2a9335d8c43db48462910f95cd0b5a723210301f
Commitment
868c5f580d9abeffda635fc8421914e41ceb1129d28f25ccaed56c1a4f79d43b
Range Proof
672 bytes (Bulletproof)
Memo
e14b7590882596f3ffd41d66b710355b16ce9672035e025643106c739cbcd222d07f1c90e3414e0190bcb3b78011a58a5a8eef321dda0a9096c91525e79a848def2cf0eafaef475c96982f60f1514864457af7b23815750f36518bdd6eca4b6442fbf323539383d378c4fc6ed4b32837800d272b330063e79bc14c7e7c0c4b3f (encrypted)
Stealth Address
80ca08305c2bd490d5e273bc785d5e09db42412a554ea89f5c05e65993244239
Commitment
5e5c74b53d45d970e7523e2314529118325251b147d2edbe43f259186e101502
Range Proof
672 bytes (Bulletproof)
Memo
4a726608f3d3f6796e13bb066b657a18ef6a44a38f630d3a57110a8899dc4bf86b02ba6a052cd0f4749848f2a8e205b017139dda8d251f26eea16830857fe8d955e17cba512c4781eea092d1958cab5bee274f9fd7f378e2b28599cafb52bc76f493aa5670349e7727addf387cb1c3d15021f311880658f2ae01e4e73ca1b63d (encrypted)