# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b0ffe33b757169277ac87349a556aadb74dd068aeeff7cbb13ddc07b63b5dc15
Pseudo Output
3296803f8e27de14d5ee09886a41a6b6e8ac38d0d533620655bc407687a26d6a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f8d8d7597521a91001df56085bb30d036b3308d627b18d9da33da9686cc3fd05
Commitment
e0a24bee025af8ef0d8fe9f92fc7518b33bb15321899ca48bf0767c86579b413
Range Proof
672 bytes (Bulletproof)
Memo
2c7b95036e46bfe585c7a961cb4f59b017d3d9c809fba0d2ada073b71776db3a6d45146e61fd2e3bf9be954dd8fd4fea3b84b3e388923fb059086adafdbe7b83bb164ec54741b2a92392dd3b9b3564ca9a1c06ded4a7dc6d502300377b9da7953e68880e36622a5fdab38902d87a21778e1987bc7d61077e4e8577983448b71b (encrypted)
Stealth Address
ca6bdf77f768635923650d24c210a19bc854b5b3fa6091e4b2ad09616ff00f03
Commitment
2a97eaf86e8833c7486235cfcbee28fc5abb6df85700c34622bce14ad32f190b
Range Proof
672 bytes (Bulletproof)
Memo
050d609930f057012461f413160ac0027e759ec39abe7e7cfca64b795387a670be27ecfff5e8a4dcb9e3cb9561fa20348ad3cd7b1038cbe108035c0305d85fa738d66b979dee616b63ed3d4787f4012c1d2ac4700795696d8df7e9efd340434de62d1b988352e9354254f4b482325e387371a4c3c0125e47125994f3255677af (encrypted)
Stealth Address
48b7b9e1ae574b2afefa88110be600f8025b4a076c355ebc9b6c3a530278f75c
Commitment
d4ad62248dea1a7a5edf274ae6f0eb52f1f21fce387c0e40280b465a630d5b3a
Range Proof
672 bytes (Bulletproof)
Memo
615fb198a6d2995e9338b0b515ac6fb9890a10f6e4ba1d279a4a15be9fe0bbe636129a4c0b23cd49a3f64f8785e8f4c3dda0287db5c43ddab52254b08089be23657523e52f44a9be870011720d1c0fc711b4b07377c15b3542177fcb0abaf510d74b2e68181f7a507a53cda0eeabc172c1aab3655b49dc871330b20ea67bed28 (encrypted)