# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f87263cef22e9e7443a54ed0b214b40ad3955e11abea463e5a43c1caa3cdc872
Pseudo Output
2a4362a793cf3f442cef4f13378217a92e9cd53648033120a1f1d4107c1db96c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e40193b9a146bcc9d289ba91d7cf9be4ed7018737aa872f6510aa2e9efef6748
Commitment
f8858d453e58d13c921dc1f70d4bb373bf885a4f9de02515ffd439da6b51d000
Range Proof
672 bytes (Bulletproof)
Memo
15fc3ac26ecff2538ef8f66309a47fa02c3b9813a5a390a40a41249517b0536db4e1a7a911f9f760f877d750a5d7ad684ac7be297738702f68daf8da153def687456bbb8faf5d2f05cd799c64ba942dd0f3c70db7fef9fadbeb482bfc3fbbdba4c0c7dc11db8bea265124731207e1e948f05d2f52cb52fc6b841bc8101938fa2 (encrypted)
Stealth Address
d8abaab24eb81fd038203f85c5594e2938f834e3a6de7c15bc02624b1b8ab670
Commitment
60b0b45f43dbdbf27a46c348dd5c7d4fc702784a25e0640ad4cdb71269907658
Range Proof
672 bytes (Bulletproof)
Memo
c484e3310d125a5cc16247796e798e231703e9d3dd40791ce974476e75ceeea8e0d546433357d6aa85392b9029701e0300cf236fd55418f631767284c66210c9008485894f6848573222b102e5fe4b3f3bf85a3b9af3709647b92d80434749b94394c7fd437dded7307c75ec6220e426f3fc29882e6b7a4403aa703b80cf36a1 (encrypted)
Stealth Address
52a82e0ca2cc61f236fca9d8bf9c4c349b24c6e2d9be0f671167f6908d4f9b32
Commitment
f4feb6352b307f6e9c3e549b16b380546ffddc0032acd8e5340e1971c29a7111
Range Proof
672 bytes (Bulletproof)
Memo
322eeac80ba08244ef8ef64ebe2f34e50cd5a3bf346490eaf184bb8d1d2db21f006dc6a67051867382b002104545c7ff2156c72e6436fdaf69d1ebe125ac4cb733aed15d4c3c95e9709f90eb8b459edd6af7dd5c2b31ec82cb47719c27fa4a89c51c15c87efd358ed8f4fcd3448f9305304402a36acb381f420f3447cf6e6dca (encrypted)