# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
389d245ced661a189abaa2a680620520f2b7d91fc1c552885422fb909b9c646f
Pseudo Output
161d1a95e516322264ccf336b713ac259527e90d88fe184ad24d4168d5010c15
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b451b54ceb4514cc182fa7356d48c5e6c79326025db2127a9b097baa0382d777
Commitment
02439a071f2c3ed47ad72e547f0d78632ec37df8a7e78a643fd942984c12a44b
Range Proof
672 bytes (Bulletproof)
Memo
0f282ef0403dad4e7815ae1438d6ee1013319c929ea3295034b65b4bb2ede3aabc81810e8a9ed7cf29561be38051543d7c9fa02b88442d49dd2cfa013dc92942159dc5e279968d1e4dd3411a30c42f769a227adaab44b0187ddf6536fd2968091fa8f0798ae8fe6bc6c2bbd8c37fb566a9e51a1d2448ef1fd69e57562441c97d (encrypted)
Stealth Address
14a8e6431d92306bc6ec525a8afca56d7314034c5044f05b2a50dac0b47bed34
Commitment
78687b6900a6c9d8f54b3d4547709358ed3a971f605fd373b5da213693f55700
Range Proof
672 bytes (Bulletproof)
Memo
e950de076c43276bddb97a8db65ab7529ac29814d38a3f1352130e2539ecdb41d9cfa2ddb238892715c3439158915cd91727833f676a53da99d445f8b9a7f3f8a243a082e1531357f376c0ce94ff4e4c1f99819df2abdab96d489f46a96ab2596adcfdbc85bc18618e89793d86497da97e91d373498fe309059ab1ac48947530 (encrypted)