# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
50d8563584244d6fe1dd79e6f424fdab02133fa05edd42ea21f608d7bc200061
Pseudo Output
e68c9dc4ce59be93af6775ab985d148031bf4b1b9a0ec529ab411e9a7318f004
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fa4cc2a86542d824bbfa2efc192d8a3c9eae301bfc1b453211cc20e28ab33c7a
Commitment
2e9ee6d60bfc39364cb68619061e98db19c194baeb4bc57fa4f32742aa935b1d
Range Proof
672 bytes (Bulletproof)
Memo
dbd9ba3a9ed92355db873717faeb9c55697ceea00e697fddfb00acf2520443fd3f2c85ce1ca1391f9ce6cbe664953f6547b1ac3c94e13f15e4c85ef72b4e028f34ba5bd65c06d726f9862a83bd43e368c16b1eb2fb8f11a97cb7ab2ee3c729c81c509b21db32d7eaf031ff1c19bf2fecae45b8d4f64c7081ae3a5c658a2acdf3 (encrypted)
Stealth Address
a89dcf21272fb0b49b2184135031ec7e7bf6a67e9808a1093c61cdd0b57dcc4c
Commitment
ac0102dd55cbbe32bf125ec58994623b458cfd11c6d0069999fa43bdd6edb13e
Range Proof
672 bytes (Bulletproof)
Memo
e9c499abc9284e4659f75c9e471d0b427f9d5dc035eea5665344b08f446117bb9afc1f2cf7fed1fedc75b43514222f8d4fd4d91707169ce6b4af5810371492cd3670f5f36bb5d82a676ea257d40f6949d0cc258c3f0951f01e69d1fe8907b528783af3dfaeb859a53a062d17dde6f45215f40e6da8e5964a78fe16eaa522466f (encrypted)
Stealth Address
a86eff5e02b5fc00a1ceb8ac694204434e635ff77943e39eec4d8b517d416243
Commitment
a88056dc7d8a687ec55b1e8904ef6836fb5bfb5e8000dd5c7ad5380bb5db4619
Range Proof
672 bytes (Bulletproof)
Memo
001ef6ae182e118819fa1244ca12f8245f608f83d5b0a970a171a4600d9abaca3601b85e0c0c0b01a222ee2b96d5b5c1849e33dcfee2ebc77ce7caf4d8c1fb4496959860100e7023af8fb2b03e68101d10437cf3ac6858ff9245b4b12af2ab380e9781521c8361ef9d3230a54e2e8917497be159e6d9adecce60d9d6af0bedec (encrypted)