# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6496cab229d413021ac3fcc629a4f944ea4294ffd87346b66b2d728ec3d67705
Pseudo Output
fad0207c6552d735072f658ecc3e0b9ebeb0a6fc303d7da60a032693c7a8ef13
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8c551bbe9371a7bb9405ea84cc7f4d52717963bfe26e8e18c39d1963117ede0f
Commitment
a83fe1307fdd4792195a7f28f8ce0d2bf51facb36dd4aef0939b4078d3c47435
Range Proof
672 bytes (Bulletproof)
Memo
f4366598829ff03d7831fe213fc50c544ef9b33f6753342e82372ceb64ab5ba30581856e6ecb130ed88d49e5a8ec217d1ae9d736fe37c96fd7fb813fe54bd4d9f3be97db13e5580fa1ea4aed78dbd5e272087ddce776f4490beeb39ef7bdaad0a0b298c4c6ee810407076839bd8d6537d472fdb67448291f74f0fec55abc91ba (encrypted)
Stealth Address
3abd8e33a9ccfce8ebcfcd9960b1fef17adc0820f3a7e869972973615f395c69
Commitment
8ad5ed4399f42bf4515d8ea212d5fe1d108dc3609ce78edfb50cb22f4d4fc90f
Range Proof
672 bytes (Bulletproof)
Memo
1aa4201c38cf7510b64492a0c0f12a647847b78027a9b317fa291d5f57a5e2fa8100842ce1e575717a0489821874f2681efd55bef26c4e9a1e5feaed7077a20a72a61143c361310dfd48a823e9194c4a5d462e26d4d9375001fddc77399141cfe2145850ddc1e69cdeb3c21c2c9cc177b35c364d461e7beaf47fff03c751ccb8 (encrypted)
Stealth Address
3ca2ac4145f7a8d8ff69c7f4740b1bbe22f03a0aea55180d497b3cdf1268347e
Commitment
aee6f8fcb289f0781070d4259ca327a7e72b5847f8c4aa850b3447b015ed0f1a
Range Proof
672 bytes (Bulletproof)
Memo
e762879311f939baad8536a709ab4dc3cdf20b5a9c98450c18722109f600442f6cc0113c1f8b90124185cdfae417a262a80d133ad98cfce07f554db50bf9dfd4fc49de02be6a4b0776b8531c06a4a081f16161fad292b6e26265ddb7126afe4f8fac04b0333b3269f0624b7e9d7c704a301d10ddabb29dcdb8bf10997eab8cb7 (encrypted)