# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f09b74963183e7f7bc9ffe200436a8550a8923505cdbb569e33fac4b4e2d3a68
Pseudo Output
8c88417cd8edbb0510f093c20e8b7ff67ee19931a8a7c146f00016e6d8ac3b68
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
887dfb8be51c8d05e2bfa3d8d11d4b676706fb2362b7d5bbd6bdf11850c0b80c
Commitment
fe8b93e33e17f3987038a76da781fb141e6f887a1b5479826bd9c58ea88c372e
Range Proof
672 bytes (Bulletproof)
Memo
6b31b3661da17c87bfd21d0043c7f9d1a532cf593f91a75b2df6845fb63dd1344778ccb1317cb663aec211679fe218936d40898583518853abfaf976208d3982c2f0aa7282d53a1b96fa1fca30e81a6a5c26514657348acd0b980af05aa41e844674bb640556e76ed18cd59355576bff05034e904906c5f29e2839a385bab3d3 (encrypted)
Stealth Address
a6423d7dc3c7fca8176a9a4ca61cc577fc5ed2edf4daa011dfb390e6f8b2af70
Commitment
40955b801886f71c29c83a6a8b2ba97dbe94ca5ce08b2ee8a303f7064628e15d
Range Proof
672 bytes (Bulletproof)
Memo
1f47dae9313d95744af2678e4749eb18243ec2a3cfda480b853dd055285a01481b366e32ba893ab98fbfa6c4a24699a2482f1f14bedd81c1275879736174a1bec9ce0b633a09f808ff7fb5e6badd71c427fc331d3ba56f047d9381e1d4f82689b55c5d7286f9a740e1eb2f9b00cadc2adf0dbf104a64604212f373d5454c40bd (encrypted)
Stealth Address
4a9649473640c959397bb97050b32c0126896b33da830056c0468890a3204c64
Commitment
c0d89c94d33f698814b83c1fc70d01601af671159374621c54599bc3ad900d6a
Range Proof
672 bytes (Bulletproof)
Memo
0350ea4b7ca5660eb04f24367605276fc63701ae90500798d915994fd45b7390f20e8e8c01e608008e156e6fdebd91b56758d71d5131f583aba9e0116947a4a5e18a22abc3a2a02590c596db228fac11de61af2e55f029cf6cb39209bac8d57356ba7c17536191fefe3bb12926be7f504a08703cb7bcb06a3fcbf653c88722cc (encrypted)