# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
148bde1402e4853456ac0cf3b769ca43d7dd29814352190a46efa37581f0ed25
Pseudo Output
9a64ca53cf39a6b169dc8f24c528f44a984b150b53e61c1af86361f07ed04d25
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c64bca664d2d1f781cde7668083b4eddaab69eccd2bec2402ba807e81889ee65
Commitment
c6231fe9f454aabd199d0cab7d36c6179d5e5dbbc126b8b2c975e4d7963ac942
Range Proof
672 bytes (Bulletproof)
Memo
75784bce8b04b2686c0e0b72146367c0a53756bfd97572015ee1a771876563c5cc0857b40d73c42800769399f5fef3a6fc2215fe4a539d1c4889f796049427bc3154bb660248cf87367f93eeb2738768c1170f286b085202de075efb04cca058ee3453521cdc487449d495a1e3fc08c63df6d4e456dc379cd111de746ccb3a29 (encrypted)
Stealth Address
70bde8a1e34edfcc49b800252a247f6588bd6a07bb393d281b9f47c69a422960
Commitment
c068cc11f27dbaac9288d5692a6307a4fa7bc4b414c55043a96889ad7df81626
Range Proof
672 bytes (Bulletproof)
Memo
f8525173d3e18d5f0e9ebbe7e2653b53204f763af19d5b759737d7a447ad28c76571e87b761d2c055d4c51de9d04f73de9df14a0ef1731d36479cace3c876d7d3d81fb894be741fa74bd46a0d8f4d2020d96a63724cdc15084b2ffb7598bc90e8d9bb1d477757158f3fd048550a3391435144287fbf858c4cc2cecb34df151d6 (encrypted)
Stealth Address
868a9683afc0272dcd9e35abbc91a40b632de2e5f1c08e7927febc7782b14337
Commitment
b692d9d9c5bb818c5ca2a90aa16d32c070de44f8ace00ae96dd678baac22db2b
Range Proof
672 bytes (Bulletproof)
Memo
a970a2347c4c6342a936ba05bc5ce55da3f0c4487d078bc6c697e9238cb90ee13d1b7515c3e9400bf03badbe6ecbadea94c689f9a600c7b4d5c0830b24464ac9d6cf206a88241521630267524365ac7c501debf44b43735d8a384311723a0a5963dfa5e8de84cb54be467c15cb8d32f4743d98b70ef217b2e2d9b3150ff06178 (encrypted)