# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
803976c613d39a7378259d831717bf8536931ee8aa6a662f144b45d2eaffbd3f
Pseudo Output
723f3e387bd1f22d8d819ad9d01006b9c5fa19c7796b3a8da8c4aaf4d5885a7e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e04da02672ced7814cacbd8a1d7eeee53f49eafd538de2621afbeed673ee3d67
Commitment
f6adb2c7d464a125d27eeb8ffcd249bc7f5b348ae9cd1bafb91e8056e9d45206
Range Proof
672 bytes (Bulletproof)
Memo
1d37a4c2bafb6e79f487deb4480f6102abaa26c08dd9ea8539eaf9517bfc03c9fb47caa3234493d116489dd1761f23f29de5a5539313e321d7b66bb93630c541e8f552815fa4e6dcd3a34f7f7f92e9d4c0c1bf0fc773fe672b761d37d665378fe133f01ab2caa4d5cdea586d6bc6b3a4dd8364ca5b24500568cff66f0d3a1097 (encrypted)
Stealth Address
821d23e68ef0ab6964fca559d994e1f054c9a05d31e94ccf9126603365408a45
Commitment
e6e4f53e598df902eee32a85aba1e0b658358fffd70df328a8f5e0df0204814c
Range Proof
672 bytes (Bulletproof)
Memo
d7c1b773accba4b23a7325000e9fd4c7fc073de58919ecc407354e340e59b566c4e71697812a03ee2303a8844c356f66040ba73ec388e09444e4a6a3168837b1f69bfb18758fca97ec1bd26b8dc2fdaaca0477a4eb6000559db0bd8deeff09ad93e7ced016a5a05f8dc6eb973575afc3affe287beec3d54aa77577228e46dbb8 (encrypted)
Stealth Address
b0c0a519f40fea0c04814f7e13d0b1faa4ddcbc301fd395f60983788d14da37a
Commitment
fe04208c1ae94c7359df9ed6daa60319d7273dee4e104e1a8b77b7f42998d02b
Range Proof
672 bytes (Bulletproof)
Memo
4d8d6ef249bdd3e228cbef376d1652dbacb0fb52dfdfe8635861998713aecfdf1cad14ff61a54bcb25a366ceb9aaa3d9bd633a07d2ce27645dd40d0bd7652b5cd33a72f69b1f0c85c9ea3d004296a48a51aec5c048400994202f232e49427c0361bd52812231965d67e9e516c1af410ee286e0a032f248d5eb8cc0a0525d80fd (encrypted)