# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
70b995009790b0841a28f8965a6f18e2378a6b031d0325e907aadc5806381e3f
Pseudo Output
0c31594e95b46368f3490384065ca04732d25d840679b7ae6e60c57ea8578403
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ba18d107ad14dec2920866b4f27ce65372cfeb69b4a3e7fb007a443ef0b23a58
Commitment
9cd763013547c151e943cae0283120dbe6071f401632c6995dc13c0a5f71784e
Range Proof
672 bytes (Bulletproof)
Memo
d4d7efae3dd2c5e1f8b784e6a4d338db6170101d736de1e6a239b8752309e60efbc9b31ea15e7eb3090cff216554e8f016f65fd1bacaa890184d6fd6346114a00786ff34aeeb9efa6c7aa6e8d59a2ccbb8e9cb62629629865c6bbbd198c27a86fe25fb817300a868715ce42c9a90c9a89afb7a7c1734b8e7b0527d82d14e2002 (encrypted)
Stealth Address
785dfe951bcae3e008197c4eb72d2e6c7be739cb8ed1575fe5887c9faddc6602
Commitment
9e1e7dcc1082363132552b60f4af6a93ac18a55a28a0a0eaa8d2ef64060e187d
Range Proof
672 bytes (Bulletproof)
Memo
cea36cc51a019781f1e799247a6e10dc37585cea73281ab749b68a1d585be91bd579315305b30855136d47ef35ce7f1e8883bda282bc32b753053f80eb74fea1f658d4edd954edc9107df95586565c4cc7f2fef1c032ccc478074a0e34f54a7cc80f8caff068d44e13aa891af9cbe9353d1d4c322496949649d012fc0c61a249 (encrypted)
Stealth Address
9c3b52dda81de3e2213833f939ee8beccb944c4a8a38171a3274501dbc211e21
Commitment
e4e3fa27afdca0d009fc269b52349ead83f2dc66d228959c67e155e8797a1711
Range Proof
672 bytes (Bulletproof)
Memo
87528a8876698770098446d1656485d428ab871b49c7b99c008db8af90198ecee45eca93f683f56d744b875cfb3d99a0e6cdee1a96c3c85174d16849ec2df8f60fc86094f6d715f5920de97da2cc1315f5d0e7bb661370e65ba40874eb89e5f688113bebd6ae17bbe8ede6b14af8ccdffbc731059f86e2799a5ce8ff83b95c0d (encrypted)