# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
808ee8799051eccd43b06a0d49270308910d2ca27c496b83b7afc62ad9afbf60
Pseudo Output
feaba443969fdf50aa5b3e0533dbd13b29601d5fd0a237486055acc321c40024
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
08c77c0e011b523e36527fbfb716dc3074a9ba49de61c39f0ed7152b6dbfa528
Commitment
8e1092bf94439dc34733c0aec461970fe2073a0dfb16c1f0117da4a98371ac1c
Range Proof
672 bytes (Bulletproof)
Memo
9f58acfdecd1e3652a84f00162a7cb655d185f356e933bb03c3ee08f4bdf5555b41ee1902f92a145bdb0cf080c6d7db1df74d10e59374410516a5e722fe7296359448a4bcdd94e66f8144be023718ca4f92cec6a6cb08eeb08a6b1ddf06e5ad6b490d55ba5a6f41e2f6710afca28d5e8eace84436bed0b1b9978c649625c2e22 (encrypted)
Stealth Address
cc9bb2ffbd54f72fcc787ffbc6373f98806d3d38f3525e426580229b4be76350
Commitment
b02c3772e72148ac4c2aad2d8577b4d132c93e29b1c51f0e51c0e23666c89423
Range Proof
672 bytes (Bulletproof)
Memo
0a899c71cbee3251fded975cb27b93650e7887a34a58b5815f0a2a32ff6954bfbe0fb6a22f2130e03897c50ba7624523b932bf1a3bdc7f33aec196b84200e9ee6cdd49565ee2bae693e264de52458f0f3ec0a11b5fab387811444a28ad686d20786deecdfdd6bd846ba9ae3108b85709b4abab8784fe355248099c0ff979d9a9 (encrypted)
Stealth Address
289e96772af3efb5d3f19c95887aa2b61fcf5e443395050808a3aa7f45cc0e71
Commitment
9845b514c575c2ff76914ce7a09db1f9f7ee57490076ee56bf60b7b83ec79453
Range Proof
672 bytes (Bulletproof)
Memo
ac84fe90a1c3b843ad5615a5c1bfe03a3cac4758d7e9f00079ee51467c3d61208308b8c892987810e1b8b9cf0f1613b5cac82483c0120942f0aa6b88e99d8e82485fbb4d826805f175042c7fbf9a52b969b36b07db1ac2bf0750f0e2c54d5d13e7e6c9bdca11d328f12273a34b4ff76a8d4359efb1113c1841215e0c0a723ca0 (encrypted)