# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d411717a850c0030f73238c1b3fa393a6354da53a583d240bd54a348eadc3157
Pseudo Output
c28f04f7a37cf5cacfc52472ed041519d268d58254d71281353c9c3accf2b322
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
36ed56a0ac661b9e33407616e900d5190ee6b726bca5bcb6d1614af9c7f2522f
Commitment
9a8da6a7f7bcdf8a51c792df5a27f7375fbf7eb5e4fbf826f00344937c07111c
Range Proof
672 bytes (Bulletproof)
Memo
d58bcc00803d4cd857bb06e9b9db0accbf8caa0b0c8304ffdebcb74966fb097554bcc1e6b305a3b777e0c81d74582be00c952c8104fd15f6dd9f2631efedf6194535c24870c99101fae214fb177fbb1a2f09d677413e792c62b56890ba62a19826548de5cddab89c496c909d5b210e547bb3b97c45ba0ec04bc3ae8208cf0f10 (encrypted)
Stealth Address
7a7bcbaf38cea512853aa5f2f50cb7875e908c6c43aad40bf35f10e158a61b0d
Commitment
f0cb403a4bb6e5a6367d904dd4e90763fa6608aec6bcd4eb0dbc45c775151f4a
Range Proof
672 bytes (Bulletproof)
Memo
92cb72a2a9d8feb88b4d87a2ecbaa68a811300d941e663d1bc05f826bee7598b0a0ad64dabd371f7a183d6e50e1fc43faccd4326a8033eb35b78c0ed03641525ee9fde1fb5e99726f6f4ce4117769ce4d055c5fa281f23902de4a44402ef95d6326cbe4e008e54b6ffed0dc0b40fd804a060fba0987ab3c1011a7e413847d1e5 (encrypted)
Stealth Address
5ec40f435761ebee6bec482f09601a6c189175adefbfabaa29c44b6c572a7429
Commitment
d479fe1f84889b25ce371033d39a8fe8f1ac3acd2ff3c4f94ceee5c8d5f7164c
Range Proof
672 bytes (Bulletproof)
Memo
2242c752e6fe7ce1dc715e1c75c9b16ecaafb22ff544218a116109a1a011d984f8ec118d126e36c4ed30812db17e875c22b428e64db7593f5dbbf682a6708bf22b86801d0d411e2e7e3b8bb290f4999302b80f39648a37b9eb1f062c1ad44757afdb8ffe7e1ed26034bc1e818cebcba584c8ef60ff463cf93c37658ad784c4cf (encrypted)