# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
bef9908ab48569fcee8ec71f8f2aaaf46f955ca225542a92f4f17c786e0bec33
Pseudo Output
780b66f0c52130ec68f2b63cf7fceceab1e83657906e88bb1179d18e14b27655
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
783d38ff1e0e8b0c4eec1085ed37b921463fb65ccece2fb90072627cde58bd58
Commitment
18936e6ccab205623e3f688c37b2d4f0234ff4535f6b94c0a0f3793533980c42
Range Proof
672 bytes (Bulletproof)
Memo
1ddb5414dc76ec4cb2d051cb46103e27834b99ada7c474192f90422c4eee4cf73ff7de16150424dab1733e5cd803f51b98ce893f0c8c2b51e7a4a8168c6afbd198d6e14354d1b0950341ec29f2cb0a3f9df57c46ff1c363e52182df7abb4af2b1c44c8b62538f2273da7068288f5f50b7f9a46a03b14d9ea9888b7bbd08673b4 (encrypted)
Stealth Address
5af47c61da858f3b899bd26e52e750c407329e53c0df9c6cb27099237643b41b
Commitment
f85f8dda65cfa75f76f69e57d170ef12b22d3e81b5887d6295057d59e5c0db16
Range Proof
672 bytes (Bulletproof)
Memo
b3a417ec76cc45ee7f4ad0181f670d27b1c019e48376d6f0ca2734b48b901c59e8487499521c8877efa234af5477c95a3e9d5f240be81c16fe53510fd2d8b988d67e2f16e6d87ebeb45d8955f3f9b541c676bc26ee8697f0de570c8428b101586b0015dbdf2b17cec67f83a8343559b99bf1d58b0b77f144b06687cac1ca5424 (encrypted)
Stealth Address
b27cb8edd7b2e647a2c68bd9b7dc8c08f3ad9debb44d1b731c54e8de7b03f30a
Commitment
24df863560ca10c37b582abfca56b24bf81e7f4b64db70c394e4e60d60c0873e
Range Proof
672 bytes (Bulletproof)
Memo
33c44d5205c1da327552dc516d6e0285f59037573ff5df7a96fadab47205233a86e1a47e6e6176b6197a37bb49223de1599a82991bf89e10cec74228b6f8515fdc05091374261495a61568a9f8486e4457576704523fe7f8b8435de1e6c54bc4963c09a161dcf8bdbc38e81e9333ad8cb502c3a481123d4f1d90aab787988c4c (encrypted)