# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9e4be9ce7563b815109817d833624a745fdef480f405936f8d608bb438456e79
Pseudo Output
506de0b2e047ea17c7a2ba7a45c774aa5213d718b8d0e125d7597be3e829b415
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8a894113938ff402273f47f7e8d0cf7ae4b9158179a975d5b44b298f10053e4a
Commitment
4a265afed3c12ae7ae2ec5e051fe585e0d0023650b75b18c8aef06c9a5b49f11
Range Proof
672 bytes (Bulletproof)
Memo
ea7234ea3bd0e9714262b5dc4b45b2e7eb606c3aeeafa2dcd2bfc5bc5c3608eb833f09ba5eb6ebfae312f706d3554a647d225ce41653970ed6dfa8365270f89f9f11ae665127fc04e5f7d755b77ef3d067fb369a23dbb63846a9d7cb0e6b3e7d097e67585857b113d899a5195202a2cdeca986933fd6795bd48636a60d8bebc8 (encrypted)
Stealth Address
26f7f6a9404aedbca878911ce0dfabdeb85ce1059e6534520c21270c949b8e49
Commitment
84c012df0696883f8e02630108adce4e7b3a35744fa19dddf3bd876c41dc3e68
Range Proof
672 bytes (Bulletproof)
Memo
23b4a69f0ccfb0f2a92f672f4dfc895950052db99c67e7bda7ccbb6f6ed2cf1cbe22f9392b13c6aedcd0c77ef5f6860602424bc54db3ea66d547ddb6d612a25de0fb1e5956cc905642de67a8e7aa4ad4f9e9ee81b2897ef0cc35ee58b5c68a4e3dd337f94d15ff597f455990e06cde4504a9f74c10f74e8185bb81b4ff22d3e8 (encrypted)