# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fc10bc674bfeaf5a3ee97297ebe2dedad9d5483bed068ebc19e2494152fce274
Pseudo Output
08b849da0332668fdd6600718ed0cdc3b6f85d2d661ce46c13818b11913ed378
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1e5d31a245d5cbfbe0c991ec69d12bf5916958b0db2739ec0449168c40fdc50c
Commitment
50a779b08b663182bb17c437c69b571b2474d93a16625c8c719ed28e46dca946
Range Proof
672 bytes (Bulletproof)
Memo
2d870a973c0b8d627da7e1f4a5ce9a25ce499ccee907069dcdf979d8a0d024395a8964bdac893087f59f0018dcf3165da2bf1f05416b6b1d3800cfc970ab73becaa873910d0da1be0c098237288fa615d76f13155c8627fa61fb01af9b68f3b10584dd4ef9ffd6c44e407f56ec9bf49a7edce56d18161bae31894219f0cdbf23 (encrypted)
Stealth Address
36f2948582e96db5c014ebd244f4d3e4aca7c7fd405a435eb289dcb5c892443a
Commitment
202280b653dce8f597a46b9d15b565c95a42f74ec00e9bfd2e55aba0d19acd6b
Range Proof
672 bytes (Bulletproof)
Memo
fd7d70044b9c101668f2d2ff0debcdf79dca4205de6f5ce97b09f55a4131e66196aa66737fae6eeba8ebc3582c163857a3b29b4a73ff4306f3af65a81423d8ecfcdd934825c0087f1d7a9ef985a148c56d83a6df835045f79f975f85130ee2bc020722f3c830705aa4ffbf401b62022b688ebdf9e524a340b0ebfad4768d4641 (encrypted)
Stealth Address
ae5b8de27ae8ae23f1906e3a243a7faae7b40c4ec5a0d8f227039544f42b1b63
Commitment
1a30b3e06cd10c0600888a74af305ab6374051205350df3b8b97219967243569
Range Proof
672 bytes (Bulletproof)
Memo
9189434c70fffca1923f1c24d58ab6e7b93fb70eb9fd0f1ee438c3e9fd9a739f176949e2c896cf2b29e2f49b93956cfc7f9e0ac3770ad60965ac8135d089fc068dfd506c8b19b48b0c2ef5c25a71e251dd63336a1d32c7b0ed5a0f30e749691f47cc075ff0fb212b69e481a54a1e0e8cd9e65855c28023fa4362f217c0322779 (encrypted)