# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a41b8654eabb614effa6fa4ff9d28136c6bdc9c95b8e4daa19ea721bd1ccac43
Pseudo Output
12fced7405a2bd2818a507afa823c042b548502f2baa80a89a38f71f313d181c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8280b0d5dcbd07818ae7dda28417a85e79da94d841385faa82f895fe3db6d93f
Commitment
8abdbfe222aa45d212ebc6b591534ae21b9fee7922b817e892784e3b504d827f
Range Proof
672 bytes (Bulletproof)
Memo
54594cd61313117ea70a8d303a9b4a0478017a044e1bb86df3186f15134ac8f97c35dd1b52fd2bb615d42f0dc7617587fcd934bf6eef895a0340d96a4ab18495bf2b7113671073aa74eefe79535e729ff04f95cb10ed3213da146f28a506e8aa1c0f9cf9b5e3156dff8b83b76e3b6f5a5560b6ad4e878de7cddad5643a6f097b (encrypted)
Stealth Address
ae54565d6d7b5b4fe31a6eeaed1952e8a16790de2ee833e3d1285170060c1431
Commitment
e65ba7f3f68a8d699c706ed30e7cc69896c0fa6d35e51a1242b7954f83c44f3a
Range Proof
672 bytes (Bulletproof)
Memo
8c2cdee79ebc1f5660dc1992fa8a6abb47f518cdae1327d5f49fefe3b9f0b0c8d5f1876494ae75ff5ff2c556ce842314dd7172aa2f9a9d575978b46b04f4c7c852dddeb26493a00f2c3947a42b35463dfbc35360f29d1c2b2eebf2ff6e11c412538f26428cb6596ca62254cd6b36d951461c8955fe7bff68932ee784066d8a9e (encrypted)
Stealth Address
f2860a89cc671de176f5e48ddae8061cd6ffada0d2f03f2a8b00bf626b32193e
Commitment
ea11dca2106cf005525a1478bee9e56cbdb0c90fd7a6e71e63801f8a24191d31
Range Proof
672 bytes (Bulletproof)
Memo
8ea58db55e501a8cfa650c39e482c7eaaea03193d848f9e5b6f7d4bfe9f17cbf7f325c97f40b808de83561edbc1042ef5497eff3175b1103c71836fd278a6e8554c3b6e0277039e9072b6c96690d99fed60606e224ac307d22cca4571797caa4d3e8ce2e16fe29fbca0134341d8c518e1bb420435c59be283f9fcda20922c5ee (encrypted)