# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1076ea2fb0c644cb12d65279fbebbc7ddf3433410ce485bd6464084546ca705c
Pseudo Output
509566a551d1e5641dc1e3d21bf6133aca5aedc2c53831d4671fad712ce9db6b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8e77c997bb18e17b2a749e7a08007eb1c8145e739b3a9d275412599f8cd31240
Commitment
92f74e0d434ae811b08a8cef8ef63d002025ebec538671c2c856a313502d4a3f
Range Proof
672 bytes (Bulletproof)
Memo
f3d0f9c546fd00220b7bdf3461bbb4726b682b23067eeff2de5cd9182ed49bc8250425885f18baa7d1c88a63dcc0639bf6774b35def82175bbb1b560b86144adfe3f0a3a0dea2a1030d745c6a48504be595211b8654dcb00d0d8fd555ab172245fc6978484d97811ceabf0493d91d2129990708e41f1e816adc7af23e2829ea9 (encrypted)
Stealth Address
a0e83f4e8ba43007a4e4ca43c763582096084aa7b60cb249f768e04101fb1b6c
Commitment
b2215ec445dbc4f6e34d7bdb2ffe357b8bfb77af7ea75daea2c73b2daf9d0673
Range Proof
672 bytes (Bulletproof)
Memo
f64120ce06429dcc94548465bcfba8f053508e3c50a931beadf38c814e03ea0ce2ff65a29f2dc6e5600d3105577d6073c45d793e652733db2d61f9abd2563417e22976e485491a61a3c6498ea4eb108df7c57d40f761a635c32a670bbd9db9499f3adce6979b779057865c57cfed3c8b308677959501812e94edf57583ea6d9e (encrypted)