# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c6c5b697c6c09ce42b522d382a7349b3cdd1b608c67a2a7a6bba56914735cb3e
Pseudo Output
ba2bf211b155846d5d5af8d934c84b345d21aadb7f59ca1d7d3105c86d7d244c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a8bedf325967b5844b2e8d14f4cb3cc8a5ae8eac4d5aa26b37550af3e1c08222
Commitment
3073a59dc122ba7de5c1904d0ee50ab70d46c98d8067279d4251b3a1d8563f73
Range Proof
672 bytes (Bulletproof)
Memo
39e6ad0bbd78cd2b6e26cb365363d641cdb7b8cdf9a55d5494d316e7e353c503c7eb3f2aa6b9ecfce2b6ec529a9c76ac013d07d629349749c038c6069ca0c2582b30ce12fb07e604b5b98fa919f03988b924ab26aaacb26647fdfc7534eb15c9cbd6e5b2e198fb7294b6f92fa7e0df08e20fd9a88fdcfd7a914b01da72b9065a (encrypted)
Stealth Address
00e79edceb4a5a9572d03bb0eff3d37e9426b9171c4e2b65572c83290e06c326
Commitment
14049dee31d8eb1bcc1dfde332c1ab68fd859cb7f7a268001ce0a836db096126
Range Proof
672 bytes (Bulletproof)
Memo
b2cafb8247799ba4751acb4fac19f887ed0626492809ef5f2215239a756458bd448ad452f178cf5eabb27699f381bc5cd5530cfca946355288fb585944f6558648be3f0029d8f07288cd6358e19747a01034368a9741405679e7423a69042c9841cb0d5803e3f85ee30345bb8d904570d22b2204fba71b1759cfe7953d700c6f (encrypted)
Stealth Address
d021f94767f7d1156adebe409589201cb880b10e9a02841cac7298e15abf0e74
Commitment
5ca789e97f00afe0863dabd2b4b226ebb1ade65306094565ceecf2b0f5ff847c
Range Proof
672 bytes (Bulletproof)
Memo
4d1b763bf1bce8202f3710bbdd5f54b820355569ba01a66a3df118a26378063aed837d60a62fb199b0900d98f1904be48e55f09647ca15f2d4cc7ac3dbf00087eef49fb519cb9fad8dd5a0ef0489a5ac298bd7aa8d5c1600657c7dc4ba542c62718c0ef7b89129010ade3d5c6c16312993f0e3050d864cc0a25c853c5c0325b4 (encrypted)