# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f6e780d191309fa50bb0721d9d3acf38404d962f2a511e493600d3dcf5c69467
Pseudo Output
82e0e53841e4a9aea45ba17dba3fe4c1e110e409b1b6f5f57c24e34c9d2d6243
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9863bc90e154d20362dccdb4ba89860777f59edb3204b9c47e0621f530c36556
Commitment
82f233e3b05790891c3c2adbbb003014c0c75c1a08d3b6c3affb4f39c3103812
Range Proof
672 bytes (Bulletproof)
Memo
d33bb499a1e1c1dd73842904dc34d3e1ceb3e8e1fddc0815b64de600485eb45782e5292d5d7bb916f0ee3a1bbe0535194984cb8c8b257f9ebb833eb8cb2f3b9673fe42cff0f1ee370ac8533fe4214803633590e4897713ef165a13145333164f08cd05af5c1c1e7a8e02a22116465da447e3f69c77ad9918d1f2bb4f44a65c21 (encrypted)
Stealth Address
e64496e7c0c5c193bd5c7e83016fbcf2ebeec73dd60b1c71fe22d2e858cc2437
Commitment
8ab75180276f9d1e990607b6d0520fb67b887da6250e1a5cbc057f036900d862
Range Proof
672 bytes (Bulletproof)
Memo
1576afe8b34e87c1364e82c2373f86e6c15e56a31128e6ec161ea0e17d72852c59beebbe338ca16cbe7cd1da3f23a08f5c23f99922e19d579f5a35396104bd6fd0aae4a8911032d2492b31aa54b1d69b0e934d6e381da4e93bb374d3b5e286f88ec26a248168ac18a850782a331f7659a385ef57b8fa59d7d04c3e818cb6bc91 (encrypted)
Stealth Address
86da21b9db130d5eac6b240eb1c83ddad861398843fca07f1fd8f759f28a643c
Commitment
fe490d46313110bd134e51a6e7a56d8a09fa6a45f65a936e07b0aa9011637b03
Range Proof
672 bytes (Bulletproof)
Memo
8a913d41f0fbc236aea473391260c8b0987d75280dec56e6845cb432e52016213622e5b9a793019f8acb9f4835fa161fc3f641041e3a50ab05328bb7ebe6f704917180382cddb46c440db727d5a50b49bc60cca8f6f0a834c638cff5f95bb986c7b63a587306e21ed03e1987b1d9d4b5ee075cac8fbcf35348178b9351255ef9 (encrypted)