# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1c6b07f98bf4e57c01b4da5c4118452b79d30c15533fa39907a1fb6b1314f43b
Pseudo Output
90d104f8176bac7c5532beaf571d54ad91a58acf61a96a3c7198006fea570a3b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c4c5530c2c78c0d6a1201b9dedc142c3becb8a2f683357d219e5020dd231686d
Commitment
8e02369e98b751ff0ee24c2013f4509bc3f6b0c12de48a799b96981a0469ff4f
Range Proof
672 bytes (Bulletproof)
Memo
8363eae50764f19ac0c704e8e040b22394ced07f494351f97668775bd1075fab85084fb6cd3b30ddda043f618bdaf66f7244d4a0818d2c65f394bfaf757f5d635e8b842e08c01504b722d8e959b120cb718611db3c036d7b496a6e4aac035c83163b61568562833ec7c95e79e69964e27b58d16c1d32722964048ad9e92c0410 (encrypted)
Stealth Address
e639cd62f724c170d320beb4617318248d3e03e2c3193bc31889b561cad7a15d
Commitment
aee1a17801fb07972d676c2501266605d4850306452bb7ea07c692f203964642
Range Proof
672 bytes (Bulletproof)
Memo
944e7d0a107f986c8904cc83580578f8251ecf8ab93871b8c067d7af674663648335c667826e0e2a1288476d55001d85548ce90665a5acab5759e4b3dad5ecfac4100c15c91cd52475136a98db9c970fbfcfa443a9902936bad958868e1e6fe2a0f8343c42536895aad1a06f8f88c59ce51d7edaca55899714d8a8b526722bed (encrypted)
Stealth Address
2ecbd93ebd984ba5a227b59eea8bff582a4f74d5e9d637494a009705b2dd2e49
Commitment
e68d3409fd62437618417fba54f5a8884213ab500a0c1493291a57f3cd12b31f
Range Proof
672 bytes (Bulletproof)
Memo
b83b12981c0b234fa052267c7ee0cef8eb457e79074538b65c3ed51ae65a709ec1e5fc6e80fcb5e26bbd2e5c95ea764e8553d6b4d1306e0543fa7d6d0eeb55848a69e17fa7307c414b9209e1a3408c2973b6f947c587716d94448e8db1bd918830be9303793b6ddaf9f1cca50b7bdad73e41700705cbf7163583e3f736d87666 (encrypted)