# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
849f0a451594abc324ba03eb37f1c29d349b1983dc5cc0b6fe0ab6fc9c69af06
Pseudo Output
d8542425cc9da4a62fb3a8244cf2bb4d1862ed9c554c0138ff98c61eb3e5471b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
62e4055506b19bc6f8af6f8e1df9e678ecf658a65724cdcefcfe84aac2d4e638
Commitment
ec70ab963fc4014ae7753e869edf70f2914f7e13047cea519750889eedd10a18
Range Proof
672 bytes (Bulletproof)
Memo
f1f150ff0351a4377160c4af96b80246f898125914c7b576e2c2f08487da893f06fecf4b0c49150691e3fcc0415b797a18e08866a088c9b99a5f8a802da4a2ab0fdec7d3f821bb52401fb1fddeaf978eeec666a023078398b9a088d105e07ce92825fbf34a76888003bb470978a335b8f3cd35d18139257677f337680b7f3e15 (encrypted)
Stealth Address
f64d75c9ba3596f643fc7e1f18a6158d0d3357adf5b95e1acf7c02d7731cfe4f
Commitment
cccc4a6653e42405b80bde1995637928f96fb1595fc5f85146f4c2179d494743
Range Proof
672 bytes (Bulletproof)
Memo
ae583cc1dd62c33a2d439e8e5cdbec750628057d1d3ca0c312f64bf3164c253fc2052a0b13f858d033324dbadd4792fc1b888a65e8b8f5bf1ad935d6252bca3ddf014a72b30546e62a9c1df5f3230d9b90dd8619cbb775c21bb09616b8b147e9674198db4390d6e3545d3538b2cc44d0c9787bba5acc47d49432c4de8a5a259a (encrypted)
Stealth Address
4a7fd8ff15da520c65341cfb4e21f33bd272744518a19d57483b03acd1a4aa25
Commitment
b06ce447ab12bfc98af2cb6bcad4f37c725bb42a8d89311bd926cf7a2eddd209
Range Proof
672 bytes (Bulletproof)
Memo
5903f60d5640014b4e22e05006b0ce85a95e75c4fe915a16d2f249235731457bb710cea0a399df6b97fc30bdce53b53133f81bb79dc43b38a73218509b97957548d4d2291071dbbadbfcbe83c048bb4caea0817c08cffdcec3e6a20f942993978407cbb8b39ef488abef72cf037394714a9bf54dd8852d201f47f5d55ff174f9 (encrypted)