# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
be92dd3ce979032ec19454ee99951d6471800e00ca4c29671d611c1bd041aa04
Pseudo Output
9a450110f224827e6513107c44562b12c63608b0b761c1e8110329c30f269d3e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5a56db8aef60dcc37227ea73daa4037f5d7d831b7bef4d099f49285aa8ba6a29
Commitment
f6b1d44cbaafdbb87799a16f48a5dde855b0084e3651d394d5f6a4e8dfa61432
Range Proof
672 bytes (Bulletproof)
Memo
3302073b17dae6f4afdbc727556ee2c746711668ea94e870081799107c437505201d386f88b4452e6b8ef7aa9e29fba17eb6c93e19b056699af05d0ac2b8d11c3c2a671bfff8ae0b8b3cd7ac921a84b9c181f93d858a704df28baffd13112e186b6fd06104e16cc73f5b2b3ccd8882e054ae88c8894305d56680037ea15a368e (encrypted)
Stealth Address
4e017d6a5d35dcdc2bdc5b0966cf39f90d51d19dd3c797f9a436bcaec7dfdf15
Commitment
3e8d40fad5aeacd9d47fe73176e1202eede4ec87c4f4ee301f63a53da192d525
Range Proof
672 bytes (Bulletproof)
Memo
d585ad550178a32dd7d79188b2ac5b85a99b17577da57b4fd32e78990f734d9ddf6eb76705db7a7dc9242bd4cc4d0c9067d1192e81afb7af19fbd38e6ef0aa49eba66167f7303ac870e53da7398593425a27202504a9a7a459cba72649ed1be9970fe507039e95b3c22dc70c74a6a9fba259951570b233185d3f76b2a8ea8c38 (encrypted)