# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5a6362635838df345327ab201f6063a3216a7d7d66471b52fb780411a87aad45
Pseudo Output
e0dced59882d8ffc228e06c0978e8f1d393bbf09c644a8d4f8289d4672d9be5c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0a0bc0293695c35f8c13843112fd520f8d3d8f056400b49aaca3b2bf29795f36
Commitment
6c790a6958d790f4aa5e056adb335ca4e2c948e0826aaa2b30568e5138e82375
Range Proof
672 bytes (Bulletproof)
Memo
f4bef050be62164285171ba720da85137692c8e7999d5a155e2092f576e3eb932c96831b907684463858802319a82359c7f2272920875aaf59bea31720c7211aa1ecf3ed82778c2b94e97af4133286ea267e4cec425c3cc7348b1a3beb32fb606dbc12964f1e69dd0f79162db91613087ea68fffbecf521bc391d52c2630bc6d (encrypted)
Stealth Address
90d648c72c652975b0cb20bbc980924c5191ae744ee57b4adec652f98aac125b
Commitment
60b2faf4a521a9c9161f61b5218f2ea0530399e53a45bfda45f36d56da261c7a
Range Proof
672 bytes (Bulletproof)
Memo
a43f686a9e0e033dacc9d74faa7043635d96074880e6a57e3ba08ef3c008654f65220e5c71ed14fb5cf5b17a5287d2ef9ce81cc1ffc679c83781b75761bf19e81256e7cf5b126e8b97980f284644515c279c35258c55353e5aa48b87f304c2c8ce70ef195c916f1cea50e6ff44ab913111e217bdaaf01799be7014949f291ea7 (encrypted)
Stealth Address
ae3ba5ceaa56751e5de959f7b9c9ed98bff71684348d3660feb226c5cc5b7643
Commitment
f82be64a83a5ece8ed50b1019268707da2141227ebcfb839dbb2ba9040a2182f
Range Proof
672 bytes (Bulletproof)
Memo
1a423626dc4a9dc4eba364f7bf55774919b7eaf2a0fdec1775da5d20beecdc1b132d88197d8eb02d17fe87f762ce1f169ac393ed124dc0ce45d0df63dc402360f100bd71f549688dfc1bf5a7b8f1480674c5066d0afafd72619f406f80c88513dede074744c11067e69012d6d0bca90d1a7b18f2401373d7dc19fa64ad7ae528 (encrypted)