# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ee73fa03a3f8399f8646d444ebc42b816a0ad97c3883db1c49156ca059daed4c
Pseudo Output
7ec9def298d031eefa357add41bc9c9a94418fb86a2339f5a6e818f72e886f2c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f8cf7a9ad918555ca9b599de6fd5321389cf602b90498c2b5046ec9284068174
Commitment
f80cb33edfca786a4469ebca9e638e3d978551d35bf2050cdf072af8c9d4a37e
Range Proof
672 bytes (Bulletproof)
Memo
2b4b69886608f1eae34859989ce7f2b99c7d122a484c6341a2200116fd3c346c9f1c75093b3a0f433fc6887b88270ce6c8ac517655eadd6345dd4b618425f2a01055e56ca53e48d99f66ac1bc264560384383f0d5308acc5a3aa03f2f1d6a45c88aed8a3f74327abede5901e2ebfb909e173d01a1603468d9cdbb5bc875b56b6 (encrypted)
Stealth Address
2a53f07f6659aaf276ca5c312b149020c90daeecf3eac089db3a98c55fd42458
Commitment
3079f6493625d77d9635064c286e0d25940fd633fb4fdca9783da64521207b4e
Range Proof
672 bytes (Bulletproof)
Memo
99c586660fa8ab0da9c7abea66f4136e301aead2941da5d6ef945d85fa1da61a4504d9803bcc2133e6b3cb9386d130b711b1d284565811f89bff4f9c979b617a120148cdd37349d32d4deb41181b0316a61eb6f244a64033235abab2432dd63ae5e41c3f9c277d550a4a30ff75c3ec891b729f7dbfebef44a677a7a9ff484aa2 (encrypted)
Stealth Address
b8390ca85576ec5554be2185532e47cb400868d6b7e6ad940703f16f0599e32d
Commitment
3aa78fa8de56de8503325b18a41048a9beaa8f0bc84aaa652b25191ff99a0302
Range Proof
672 bytes (Bulletproof)
Memo
df56fb03c3f91a5184e47ffe9b9f0a2920c7299c960d527682596c8fa4246ebf2845eee1c522c896036e111ccd832fae69dc0a6639b0c667228d38ce3d104c41d1d563d0bd008317a2faf69f8d401cc00b75a556655cb98242bc65c67e071132da4531f61a473351e6548734a4c15e2c5d2ac72c9ae2271a30daf34238778ab3 (encrypted)