# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
cab4c02afc01320b19067beaa4c6ae1ba2f6544f140f02102c7690281cc2284a
Pseudo Output
98ec42d60a328d00ce22693adc1799f1b0e671bab9f4599b0d46f191bcf30d5b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0ad7fd1592d3f9241a69244e9b1cc9dea5b09bf8d948da06cddae89301d9484a
Commitment
9ea6c485b6a1bd376472733fb09f94082c14e5d634f814bc097934f4e7ef0436
Range Proof
672 bytes (Bulletproof)
Memo
5a7b8351052bffa6f9ddf18d5a420ec903bdff99038e50727fffd19196982f2562a7304aac0ba4bf178ced218fd66f80412227d9b9261d6c9c8fd5277f62340fb5c3594fd8c52324f7bec11cd0c0b0061311d5ef7eca9a05bc391f52a2bb38e4957204c3a9525f31cd7f61d4917e036201b594ab7654dd07e516997f81582fbd (encrypted)
Stealth Address
ded9d6f8626cdbfe840acfa3ae1a09db2ae7722935c9de6a50c901b847ab4c04
Commitment
6c7dbd82b112e0041de46cd77ea036f8edf18831ddc2f98ecba5ddc161ef8e13
Range Proof
672 bytes (Bulletproof)
Memo
cd3e685aa950a6bdd8c90d3db3b782aaca0517af062d4839cfa2ea5ec0df4d9811ab5cf682e49d5cd5ff0cd03c3401c1c13a8ece264f844ba4dfe20dd05f85d0c5d809da9d658dd20b3fc62f02545628a6a9bc507450d7f574d2e017e5f4d208f643ed9d344b81791d9776af8a0a88e8f349a199a0bc610f7fb545d24f283c8d (encrypted)
Stealth Address
4ed2621383073e34c1bbe269a2ec8ca48f3c0444486ad1a9646f17aa2f4e2857
Commitment
04dde68711e8b757cb9e61f0c5b7fb46c2654bc98e1aa54c8e013912536e9b7d
Range Proof
672 bytes (Bulletproof)
Memo
169620c8215d67e89b83d1bb8e0e484a6696c98f49d60b3cdfb88b675267eaa3d2bbc64c9ad52f896925915e75cc3c31702fe2b25849851ff7eeb1ef404e155f8a551020e2bfaa5e2a8a30629d4532854d473eced77764819083b66b59039bc43b41df20c6ba20bf9e1c0904da5d0b8f247de1631021223b8786fe13060d3c03 (encrypted)