# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
12bf540a866ffd28d662d8be55c6044f34d0ade5e157ec1216688746492e0f03
Pseudo Output
1406d5bdc49f4add221ddbbb1600dff4f85b59efe009428579151f27c16e7651
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a48d3b33c7016bf28b646809af7f60b1a85ae1ed8755f02246d2b0bec4eac730
Commitment
264c07bd81917fa419d1647c6b4bf0e1159558146e26a52a298b914d4456cc10
Range Proof
672 bytes (Bulletproof)
Memo
849b705cf532d242f5401d53dadd1c212530052016267eec6c04d377dc2a290e23657628715526cd9ecc12e75450490518cfb6d87b8dc27701701b6749da0321e9aa7debc41ee473b08580f154943b6eb4a790ed7f67176b275bd6b9b7af84c3e225ea93ba742ae7b8fa62b21443c1745d0068c12ac970b74999a248d429d595 (encrypted)
Stealth Address
8028739b50f387fc170830fd0d6165540b472bc5c1fdd0cce534869e94573170
Commitment
de829e5fbc7c7d61b7ea4d1b2ed91de4a60c56d9bd9b65bf00a8b2aae2c92544
Range Proof
672 bytes (Bulletproof)
Memo
11396e5c3c8168d6675178ca7a4ae7e5e8dda5175b3f4f4487968b372af9c47dc71139548cb71f3c4f1638ce4bfcef1ab5d66a7e31c1c98a344ff828034b9e1e372b8d26ec17cebfdcbbc4e3e6a6ae0377b9c602b5a29373f4e4d5e6fc5998a630fe302dbc5dc4fa22528bb50943b3629acbf3aa78a67d0e48aea1bd912ecb37 (encrypted)