# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3419e173582ed377b695edbf2cdbc82e0831d688bf8fb05c2b511b66a699ac6b
Pseudo Output
c69768043629e7ef1bc86cf3bdb23f80ee900680abd42afe2035a1424efc4725
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3e98315167e86286a3eca72e79bb925f15d11ea698d6a6007f15dfe760e57b16
Commitment
264bdc2b07e2f0a18bb15b4a9a72c2a9c0b77e7023d55786d4cc71cfc7044505
Range Proof
672 bytes (Bulletproof)
Memo
fef081d4a42c8825ca6b956e58d45e719c63648a3405e4b610ae496bdbb9c98bf1817501c5634a85f71711c5ce1a599b3c915b8bb9619b2e228a015a9bd1af9b82596bcefcab20f10bc9fd2dc8489d20463302ca94f65a61c8602a64f4b0f72c1a3b0e3305b1a4ab7927f5ddbef65d5b0e7048bd13791c31755ecc0423aa58dd (encrypted)
Stealth Address
161912dc8cb76c48be266040f3b4ee79dd05f0ea015d3bada253972a789dcf10
Commitment
60e712f27c0e9bb2eddcd4ba42fd260bd4903254ac72bb684c87bb4494ec396f
Range Proof
672 bytes (Bulletproof)
Memo
23aa8b3cd99771d830118a001c69061167c934a59159214fa2a5f932c79d6e333fe9da6862fb25f5754182dee732d82dc0f5d89fff0f8473eaa284510a59d0430db7cc171e387fef22152fa0375f101ee0309513a116149e285b915efce6799a0c8e52a9bb08b251b272969cfeee7ba383573d61a77a6beeaf293d7179f97d28 (encrypted)
Stealth Address
186836db88bd73a3745673dcd3f072dc27900eb7c7db83783f27d38261ba2013
Commitment
0a65d522c10d87a96f6a90b17c1a8fe3adbaee7d516f0e05196dbac5fe5bf90a
Range Proof
672 bytes (Bulletproof)
Memo
6770764a1518260712aa894dd82ef0545bd60c4088e960fae151141bea8277492af826f1c891c1052d308293998b1e65171abba5d8e2cf70e9b7e4255af64b4efaa76bc880b651dcf2f9b02948f1f63d02d0ab750c7b1fdfff46258f9e2aba2f5ba4bd2cd3acd181b89b1d9b4a8671c970172932ebda4e12c3af3fbc13f88109 (encrypted)