# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c0ad9f1d4ffe15e19a21dc39fde9c2aee9fa3d26b661207411f9b5d078869f10
Pseudo Output
2e30e9b5884b7830ae484646fb35a73a75d211b7f7541ca586a11b58c9fe0950
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5eecacd8dde28fb64ffc165006951db5a862e938a3915ceb7d0af9fcb5f11c0b
Commitment
ca9c9a7e1f8b07a2603b689d19974598e5660711d21f747db469d6be20011e22
Range Proof
672 bytes (Bulletproof)
Memo
1e601d5d880673359d71a800be785db7045191857734d6be4046e88d371ad654856c6bd0924ee26841537ce662f9dc4c6098d8347e3c16224cabae2bcf693fd4679a74b4b7cf976d83d91615180e51673ac2ed4435b22363cc67094ea6ac963f917856ba3909c2575d10c24adb604a441837f57ae2d38d9fbee95eba1622e998 (encrypted)
Stealth Address
a2122aa73e0f4b5a35c749fa118d57fb6486f6d8d8a7e3e9b65f219a5ebb5b63
Commitment
8ce6a36b6c45cce9b296189161e034c820ffdde8300bcadf3487bb1550825b03
Range Proof
672 bytes (Bulletproof)
Memo
6419090db14f6ab19d443a5cfe240dc42a55ad2981a96f019abb8f201ba438c5fafc5ce3bc31f8d76547f82c7f68faaef50bd19ed52ea4f78d67dc328b0046ae31a4d3a664ac23e33c0db3f6707a1aa6e49655123e364f71e38c2e4d25c9ebb219dfdae136e98ed1a993ebf229337799ae5f4e7c7e1f10296659c1323f5ebf68 (encrypted)
Stealth Address
d814e856af8721f7bf5bf2d21d6eb716af2a60bc315bd4b8ae30efce0d004e68
Commitment
347653e08c1c6428bead64c5fdc6a72e6d18de6f35c5da65defba2194a80c50e
Range Proof
672 bytes (Bulletproof)
Memo
ce0f6b3931a2005f4344dc78ea3baf5f4c4a6ff4ede7ecb1e39e084adb892934f99af5274493fa30b5bf0355a7a94a0d48fdc770af2eaa630e5c5389e14a16f61da5210b87117cd6918cd39ad3bf4af5a757f7f0a32212d7ff804d66afb58f452682a06ce1a1d2e8a67fdf51b3ecad7e7d397e65a054f595034b29aedd90855e (encrypted)