# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6094644906a6c27cab518b821ec0d98768428729b6b6f656f02168d55e89d236
Pseudo Output
70814e67fa3d81b71aa4b6ebf46b76a01358736b1731a5991080c15994e3227e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e217d310f6064f2c462e29d34b363e9457e3ba2c770f4f5effe9c52ff7b01864
Commitment
ecb1ee97b0902df4cf087f0bca41a35310f20c0a66753c97da6659a82b81ae4f
Range Proof
672 bytes (Bulletproof)
Memo
9dc296ec95d69e5fd3415e54d78b8a6d3710ecf686aef0db3521488af11590c01687e533abccdae2b1651bd6497264bacff3101bcec116b793897a000c7eef8647204148459333395fa81260430f4412e258e44ecc08c770cce8081978cbb15efc8d1f0db1ad7333e5cc07a416a83eafea6ae976f0cf371c78088c946d4597a9 (encrypted)
Stealth Address
02a4208823a62175448f4bfea16920cd7e4c0356e15e76ce26fed8ef65df500a
Commitment
883cc64549b77a2b5d560ced04faff70030786bbe5918d8d5644741fb4e3bc21
Range Proof
672 bytes (Bulletproof)
Memo
e224a5986c586e9e76af996f6a2ea529d63ff209c586596b259fa4470ef77c0e32d0d8f99a87a727cde247066cc15f3fe56180d1c38f4cfbc5544df23852a533f3061e6968c8e89e953a2450da074e716a94c4cefbebb4dbb19eba1714cd76d66e080c16d991763e317be67139f469856d3a3bfd23430690c2b151d7ae62e233 (encrypted)
Stealth Address
de7d3eda195689f98d18172373f41eb458fa1c26ea57df60a3cc063c8c8d773f
Commitment
4c55b85f2183f7cd4e6315330ee4f9d2b46e80546445d965b888693a6297e574
Range Proof
672 bytes (Bulletproof)
Memo
78a7413b51d617e3da3afc6a9cdd17172bcf15b5e98669db0f8774af6f0709aab4a7d326097510d32e71ab73078554c3d74eaeb6705bc11de5ec115901a1adb222c0af1cf2db9445ce3ae2cfe49d61e78d0493c8b2bd95e330cd20c760fb3cc5ac701741eabee1eaa83926b94228093f4d0e827d851cd2cd37e2680c457ab405 (encrypted)