# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ec20c6cdec8c7544775581a0a70c898812907924975c2edd850fa437a0e11b1f
Pseudo Output
9ed47d2e12c621392970e06b1498a8e9683568f86a771a67dcc5b44944d65f63
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
702f0c18fb4bb330402d5dd5eb13fc250da8a81ee8d391a486161722e8b0eb11
Commitment
ea166a21a5df5ac19d4a02c6665c2c5c3c25d6ccbd49b317d7c75530e20e7347
Range Proof
672 bytes (Bulletproof)
Memo
53076945d9f3b850e85d0fc1ef350b680506d94d97dd3e030e0f75d703a29dc8a7cc5edaede743026dae493949162bfa87046cdc6b3efb73c6fdb3136b0ab2b993cdc139574953535161b5fa8076f3bcf3cc76cf6769caa3ba575bd23d1ac6aa5eaf17d82cf8621f0c2365d4034618ef5d72abe9578f6e4a9de88d5004beb283 (encrypted)
Stealth Address
94d5345fb23077d161c2a914646b2d2885749247031a0bc72c9dfe7f7364377b
Commitment
2a9e5b59c627585abbbbeba59045eb8fb6d76da3f13de0474e3ea517a12e4518
Range Proof
672 bytes (Bulletproof)
Memo
aa4e4a0c81f2c15d29b5d669d3bc09d4e000ef8c9d12737374b0170115ff997910af8fbb98d004a8da394421c31381bcb9246e1821738ef30054fc074ab70089b410377e79c828b5977d058d7ad6b4f82fd6c2919ab6713b6b64016c3d7ce4296be2be7506ad77b81c86eb4e7f6e60b388ace491eada9104f3ad6f17d3362ff0 (encrypted)
Stealth Address
d2ee26ad1cd80e3c173f98aa6f7d7948e279f5686ba215cbb48ba2396c0c5642
Commitment
4e0815add0fc618e7141c8f2bc8e14e96d902eaf5682b246cddac465290cfb10
Range Proof
672 bytes (Bulletproof)
Memo
f3a54fee0dd3140220ac1cea32aa7f9473c316551053004ca879bb0e9216cef6d033f2ef812e6baf08d8f84650e19064784e9dc3ddca93f62421550feafcee18f1ef1ac2de4b3361f4f4bee3a31f73e7af0a8f0f361fd61e322827fdbd85964cee12fe150d4f8e3c8ce0d1f7633098994f9abf3e71ec64aead9a564c522d856d (encrypted)