# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c8f29b7fb1ccff07628f269a6cf308896034c94e3c162d45d4ec4b403ed19376
Pseudo Output
ccab48963ebe27032d785de30516d41277506e1dd7ad9c09bca6b02378ffac18
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a2fad54d86974808e01c05355a5f3c868827c3cd94609970ec643d9f89490a09
Commitment
9c361767f1af1e84ed751c0677151adb86a3dbbc2a6b2f56a8924013f43a4018
Range Proof
672 bytes (Bulletproof)
Memo
904c4abec9681a1c35edbf058e2273ef3b045f417158daf2da9279f0a7dcdd36dee32065fe6a8dfcd11f899cbc1f1dd9703609c68c1172dbcca98b859fa2c073f54d6f287df548f1c4b70033d45be2433ca5f9888f563290e2b3833a1372adf1cdde10412a35e6d448c482d983cb23f66799292dc8c65ba3e7abef346b62a742 (encrypted)
Stealth Address
860f08aca225cd1878220669477c2612593646c3e6eaf0049b70d37907c7ef65
Commitment
00b7b85b4150829b31dc203447e23487a1abce6c30261068b02fba1762f32150
Range Proof
672 bytes (Bulletproof)
Memo
8ed1d2bc19264da1665930a0ca46ea5e93b11e9f4086c3f63b9e28f24d37c1a66c9ac55241c4a46d41270871df3ea43584187bb7d8c49fa9f640f89631a4b5e2b43899408a1a9529257721b1cbcc504a66dbe3e234e1ca3573498dcc9a8b6e6c53756a4fe84de47220175b40be906d4288110b3a8882189ba7b6cfd32a60fcfa (encrypted)
Stealth Address
2c3ca48c5c6b0bb1d0ce7f15a5e9c366640a63b289cf901ca57fd54effc2211e
Commitment
480fc996553f374bed381c2b76b0dc0a0a6155587d322f1ebdb27e9486b4d966
Range Proof
672 bytes (Bulletproof)
Memo
07af8d9886844e73772caa9bb09531b95c3026b928a1b8332ac1ab34d949d9aac464e1995ebbc06865a24e7dad7552ce06043322afaa9ddf8b436b3a8ffeafb59bb6b6ff931fb848435b9a7bae1a9583665ac097222b37825d113331bcf9cee713531e4a7dc2a0eb69a8f259787875caf717fa82fe95b7751ee7286a1c364706 (encrypted)