# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d4fb918c32c5f53dfa268abbd9e17298e285134c6ab87f1468d3b8114fad720c
Pseudo Output
7c6321d6b5b3c879aff59942848e9e578c2d528b0e80f12dd1fcf10cb5694a60
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b8f5eeb5ba112d8cebb232b80833bfafd7cf297da2d6c323cc4b091e79c23d73
Commitment
9270aaee5840b9dd67e5883fb871362ed3f2bf80123aab955d3781932903ba26
Range Proof
672 bytes (Bulletproof)
Memo
5dac2a26c0b8bca630dc9f7ab507f7bbf28a486fde598a14857eb8a37743cdb5d12963d6541fe7dc66cd1151f97f0ce161018bcc3d57cfb1519bf74524c99fa555398e40d8e6305880fba99ba865575844a76370131b3c30c5a65e57657433d095a6cbaf087693a3f8501e3887c85cdd571104afb82645cfeb69dc49c882e48b (encrypted)
Stealth Address
4c8362d0a85f8f60777916f40fff7a2b1c0dcc22f2f7a4e7fffe9f1517074a28
Commitment
4a0680fa1e1c2a027ac1c9242d3ec133db06b63e9bad91023449de8e614fe71f
Range Proof
672 bytes (Bulletproof)
Memo
4189a2b4bdea5711caccd1b6e1f4cc7a4317fa34a6b57796e4cceb9d72f0c95735cea40e33641fbe24d4a046126b9cc5a16a82cf0882a271e38822dadb05936cd468b45728876b6ce28995519bd1d76537824477fb74155d8f15fabf310515d95f606348991a09b5b2d110ba6e1fc66ec2c043918cfbcc3cd290265184f48b6a (encrypted)
Stealth Address
7e30f8c96fd797aba44f94804772772428f31a2a7635d37ddd5b3a3c4f5b614d
Commitment
3ad077e4e463d660d0da32581c32769e1cf781bcf942edddca517f5b33bb513f
Range Proof
672 bytes (Bulletproof)
Memo
ac5bc843c0ec4f03573e3767a6b9a58d3ceb5e096865459a5695b32a1e20d4671274be59f86571e3332d890d54ddc7ca38f1a5ba2e8645057ee84855bd32d2bffa160d759151dcb587472047aeb83916e461582fc5d2ea3fcc4ff4bf1a64de352b83602caba03f28daff49f1949eac76a6778015eced245ee9ee20d0acf964c1 (encrypted)