# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
da6287218353ef5543f3ab74aa23705ef87b79b04d1606055602e9c85772c340
Pseudo Output
1acf6fe4188c8aca8bc2560eeb3530995763b6d810cd24e1351160130fee682c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a6f41c98a1b31a89d24e0ca033f5a5a0b17b7bf7b03a9a76ab556c03c5c63c06
Commitment
f4d3edfe5affe8c4877b98d24d6ba3984bc9788a29f6c90de15e2f23fb9f4d0f
Range Proof
672 bytes (Bulletproof)
Memo
8a58d2bfaadd74efb23706f893546a3cb239017f8f14133948daffbbe0a2c681d3feb783d52253a3a8e1b24771aaae0924652630247fcb1942775601222a74fe6a2077729c9de768fb07959db37975df11d2830d23815d7e2058e314c5ab5481476bb88374a03222572184dba72689b641bcdc92c1a350fd69fc7e00c933060c (encrypted)
Stealth Address
3c31c0f900dd6a2fe193a282bd4032ae56322d812d88f4c51fe5402416dd7e69
Commitment
9e71daee75332ef6b49e166a8f9a23f72b483caee8bd7fc93e0c20154c8b097a
Range Proof
672 bytes (Bulletproof)
Memo
2f8d7740b9a2ac68d5a0c2e2ca50b09e5ef4af10e3b7887e3ac1dacaabdf169bebe6db572e6cc7f786345d131e9c475b3b94672db7554379418dd3920d4175dd861805e930aae0a011e8e45dc7cb91a350cbad835c21f0ceda82b1d20c58c469f0bc5a9d0a5aeac31dff988e9dff7458cea07b561ce9d95808af5a4e0d458af5 (encrypted)
Stealth Address
0cbef9aa90d2121cab6d41bb966723c7ae7ae56eb7522d73bce94f1bfec36215
Commitment
e0eabb66862e71cea212a3b0319f4100b11694a27e84759733a21568078aae7c
Range Proof
672 bytes (Bulletproof)
Memo
b66a6278ab652bcea34896d7e4776b1f4458a7fbbe74184ba6b42ed32abab824664f1d7468fd96d35bd3aa4726381c43d2e667e91a144b9764248bfe374f1ccc715f9ed9d3ee4d2027e2edb91c98d4bcb8bdb4200c993261a9f27265c930887bfb75c40491e14282e1076927728dadfc1e1ed9717ee0b8758ad6eb5842daaa05 (encrypted)