# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a25ad9db3445437d10f73396dc994f23c493b11dae56753a6eec2128ff71d805
Pseudo Output
e29e90bcb50057de68164d1d4501f1dc95ec10c373be36d53d27601e064cb31c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
be761a3968e04024f122da4293a1b089b9e530f6bd86b08bc85dd03780dab73a
Commitment
f219e13793b6261d81b9bcf619f5d98c4480bee218dd0cbe43a4eaa073cbaf01
Range Proof
672 bytes (Bulletproof)
Memo
a5510f7e9931f5b2c25ce580b6b0f370260a7b622e7cf10beaa0c2d9494ff4a81d8cbe295208dc04552e13a38a486ff6189814bc320ec2543b29746df9b1869612e94a293b3076b688dd94581a90c33ba323f9a7fdce55568bc21833c7df51de9a63cffd70765e3737059e2712ae7fd71cf65f8535d83f62090cc5f875c867c5 (encrypted)
Stealth Address
625caa5df55bd4025bd4d09421a3ff8aed69fd4ec071b914ce6eafad168f335d
Commitment
7e8f6178b80bbd35a0359632faa9eb9f09479bee7758cffe4eed1ea3c11a0133
Range Proof
672 bytes (Bulletproof)
Memo
a74c91accb44d08c557767731d8080f25a0d6093ba4ae57e99d69e0aaec8608e9ce16262d385413699f32b0f5a4fa2942c502738df80ca2755af1371084a64d62045fa2227aae18097556fb233f92b52cc8bdb2c89b63ad3d9aa5148ff04eb50642ca9b329849db253c5bcfdf09af087f19cf08ae3c043681a13d96a4dab067d (encrypted)
Stealth Address
d003eca49f199402081d4adfbc5e639b4dc59bbc4cda62f695e9b73336d7365c
Commitment
8a48a1691bb95d38b5152682d268af78b59493f3a593a240b3a23468d1f79a53
Range Proof
672 bytes (Bulletproof)
Memo
983dce5c820e3c4a20b385d6873e441a2a19d8d38131ce091c52413b7042a72fe28757dbee7a5eaf8fbe8f46c32f05fb630d5faa5f21a3291d3e084591cfbae26c7d953a32d596090d479acd38c2aef8470e764ce5ffec580ec41c8dd6eadc50ba6cd97011b1bbca3a0f340e0987882a8e31846f5129fb6185b0f9eb6311fb42 (encrypted)