# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d04658d663c8d3c94c041c3220d03a9c52c39af6a873acd3c48efaebd7fc3c43
Pseudo Output
7e17e5d08d9571db0c0c6a15148acbb801983f2493c551b354bdf488e1711312
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0ccb269905d8a9e76527fef4715f2160bd6bcd9276ed2ae518f7a7f0aab37a1a
Commitment
260fe54429412ee71e12aad6f6d4fd4e70362839c31f01d4ae909b35e09ab81e
Range Proof
672 bytes (Bulletproof)
Memo
4efd5e1d63a0b37acf4db64d02cc0342e95d27d7b01e934cdd2ac6912ffbab91280b1d97f9a137fdef93c5f640eff96023b4d6e61f9817c31ac68e127260731cedc7499c98298170fa422bb85a22c618f08278913c09fb22289d0d1e0d86c7b05a85275f4cf7cc0bb31f1df2e790a9ecf6bde9bb7fae6f6e3145dded3d59c3b2 (encrypted)
Stealth Address
621397f7dc6b2d199355ce727c5d846c2579224a4d1cc8263e4984e59ddcc912
Commitment
68c7b4a68d1b129596bd7b31797149e5775861b912f8f372bd72a66afa3ae87e
Range Proof
672 bytes (Bulletproof)
Memo
90a1acd6b54641978138a34c2709a5aa6657027f074675547ba86d3505162e70d6e5a4b0c48bcd3bdf7353831bb67c4d153a3ccf7d7ae4cf2166334d0fb9a34492dd0708159dbc251d5a77396ab9c0e96aefde412fc0172b25f9a2591e2cd23c0dc3f7bcba63288857459c2b3afc98872a063638e8b5f3d238297d89377aa913 (encrypted)
Stealth Address
a25c6d86c8bc49be5c71f4026e37be08150b2c594eb77a8cd8a8caccdc56505d
Commitment
f4e4acab8306610a5ff516e15b4ccc9667660153f9f1eda782ca083954b67d74
Range Proof
672 bytes (Bulletproof)
Memo
e24298a8285110ade36d117f43601e31ffaf05c3ac6cf72f4b9502752e0f7c64d4895bce77c15dbbc5f359a0e2dd293a87dee400f40220aa7a606a3dc1b9d9f84bea1bbc849c61264e27c73f262d123e4a055eef09f63061e63235434ca62fee8134c1eb36e3c1f654423c34d4ab6846f372489fcf3282f340a09a4337d469f7 (encrypted)