# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f409c3b83529ee7c62bb93552c7362e5659c8fb590f56631e519ec3f04cbcc1f
Pseudo Output
02356a1075792d902b381ce395d2a025a90369da1dbe8cb232737b05a33ff677
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8ab7e7753f3e66d1792641c8aa89d96d66f71632c3e333e2ae87b427defae82e
Commitment
16148ab4d977390eaa28b7d4e91bac829451098005f3b9643a9df084a80b9c0a
Range Proof
672 bytes (Bulletproof)
Memo
1e2fd31cd2b57a3be6a4a08443eb838ffa3a2ffcdd41aa8a79b58df21a8c89beaf30b9d84851a22e58d53de6ef48ee38bd443c63d51528aaf62af1979122f136cefd07c11e834fbe7379a0f1a4d9290b1456432b576ee4c43e4bb6873996aff16aa9804f3ffa543951438874334b651b7272c8af33ebae82f6d0fc1948de6e8d (encrypted)
Stealth Address
c8ade309a9b65c77d8283b3e9d01f5a983b8176539fd5cc8702ba88ba0c7f668
Commitment
0465c94c475f2b0c1eaeaeb706d43007eb06d618973d317fe31c47bb296e8263
Range Proof
672 bytes (Bulletproof)
Memo
2106dab73941c8b1cb71ab95879b04842e95275f90e0c8cb3f1276e74062397bbf3676c0b195349ca51ad2f44cf8778ca917237b23655040905210947da3673f4865bedb7007cd47028bd1554c7e067d720fb742f1002a3ffbe585fbf73eb5084ccca7595e29cc07804708518e927a170a622f2fa7b3491da503ec24a04bbe1a (encrypted)
Stealth Address
6804a9ed351d2e4228e92e1994e364a9005083edb4a6588188e03aa236913b17
Commitment
145ed4bfd3f539b7d3cfa1e625eaa3f2a530d9e63f02611764e3cea2cb3f905f
Range Proof
672 bytes (Bulletproof)
Memo
78bc8af9222813a66171c428c4150c84994568a42718d2309ac3f8baa14bab1b4fc2814a1c377bb37ca5e867e39dc73ee09bf41268afb8f0bb0b97e8e63eb08a89519add2b83f6724708807f6cbaf6d8b3d44b9a0c9da2b3bcc57b86b8fef07982cc7ab3cb1cadee5ca53e175ad53acd4ff9b3d5294da66d4bf1878955480e03 (encrypted)