# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a65f2bad78467fd5f401b8b24d705e84aef708907473de204d2ce532f916fe12
Pseudo Output
e044c001b5084302ebd5365b1d6c112de99cc7b60e58dc117546d88f565f6f1f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d8b7be7cba3e485ce4a207a46ae59cb45d609e16b3b6467c0d6a4c7cc21e1429
Commitment
5cf5a53450b842d20e2afa90ce00111966e257ac0c3cdb21dfdb453f0c306726
Range Proof
672 bytes (Bulletproof)
Memo
802b3a7161432d2de23c07032b206a06f9ca0a888bfa8fb7a4d2d923957e1efa984ca3bebb598701ad23f542d84418cad3d3614b075f6d9bf91a949a7a38e54c69d7e4bfc7322e6d1eeaa285bfecfec20f4fc83ca087c97c322b16c99d9cc4ff96caeaa14db0f3282134dd0007c8a6dbc0edf379b15778a0f47b042563e44907 (encrypted)
Stealth Address
369d0b346e6d2f2a474ca182a4e23b5203c058b65588789c1b58f96bad4cb838
Commitment
80c00a7103eb18c2d8143352a269767a8775fefec99047091829a43558adfa02
Range Proof
672 bytes (Bulletproof)
Memo
53ae9808cacf8fde6a49b336c9c2f6b6aa0b864ae467bcdc866b8e0b9e1881b0e2dce8460a06a59a8ae381a84886dd9b4e60821db6ce4c82d7a35e8651e69862e7140b7f10c9e08437c3d18a12645d0072302624575eb04260116e0962ea44074329ce9e7e26daf421bc03a237fe65bcb3668c1d036ec1fc6baa73f0382c8025 (encrypted)
Stealth Address
8cdc70cd1fb27eb6b2c0866a0217cdbb1a7bfad1bff24b9e323453febc3df63f
Commitment
ceab90060868f589568561b1925ec62d15018462c2a531866f37765289011571
Range Proof
672 bytes (Bulletproof)
Memo
c31257d682a5aebf0c9b8b8dd6560267d1f24580a4840cd0a73e799ff61959dfe62040597079d3f9c35816e8c8bb42503698309fa4548b676300402ee301e13dff2cb77ac58816f1665e65e37eddee6a6698fe10e39583abee6565a3ec1e7e481d428de2397162851496d447ae9c071232fda39c90a2ff99e4b84494b258f8fb (encrypted)