# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
94cebda07fedb35fb18cea28865b783224acabdf925b43236e9eb9b7dc0a9322
Pseudo Output
a81725d6b448a893b8faaa53bb80513bb6abe1c9d88db3e22d0d25889370b057
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9e91c6817cb8f90dcee3a20e74b711863b77f62c64e0133814d9ae29cf59b121
Commitment
846d2bc37b0387a6f93b8654b35d23f6bb1bc733323815e0c77d37cc6e9a9946
Range Proof
672 bytes (Bulletproof)
Memo
fd5cac084a48d37317b9988599ae73b899a1cce695d547e1e75df379ca8b6856c94621d5bc90da58aa6db0fe3965c1dbd37736838fe6fd3197d1606b6842ed3c80ff4e7429b272671ce85c551584afc1ea385be96461b592aa676d2917f0dc6f1b464cd2d4c884c1d904e5a6b9f7a2d76ce4b4e82b0bdd43782a406062fbfa19 (encrypted)
Stealth Address
6493a240a6aedbf30ecbf016688f5e79de0cb99e3a711b70912d3f18e3174263
Commitment
e84c03e805ddf5b5b23b650794ac03b72c846720d2811189be1fa360265b9922
Range Proof
672 bytes (Bulletproof)
Memo
456b987d998d4c307dfe24b85787caf6a94c9a75cd8b3899086f3533c4f454e7356f9fbb7f70e425b1b586c5a648f24b755e9f12036991f639834226b1b1d68f889ca955f3b7bc38e0e86a96cec96c9d055429b2babd2926fb5eecafc9d899f804d7c2845d143f484ad4ef9f05dde05874161fd132435723de34223e2103316d (encrypted)
Stealth Address
a83cf976f881eb4aa798fad5be114e7770673a0e08f8dc9cf69a3dd20d250f45
Commitment
c8cbb472983e8bff359a9e8938eba9b7425fd786de89d6f2d0762dcd46577801
Range Proof
672 bytes (Bulletproof)
Memo
6e4b118bd46082fb735e1d13aba354f645737db87851838f862f85d62c6a6226f2586c1a978570d7ef70230e09b11f2dc99ac8ad87224f417b4ee8e69c1072bbb68a9eb93bb5cd577b52f0a8412e707f48cf2e364c01e8622651f563b0dd7e8a21d5df45ce51bc6b9f0dc55b792fa4b231c5d760d36643560c2e7d537b5d74ae (encrypted)