# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
cc8d6529030f3e3d89cb335c9491418080d4f3bfd43bd26435c8aa179df7f523
Pseudo Output
201a3f00d9e10b4d1a7796c9725e74205d6894bdec34141a448df64fe0cbf137
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b20b1953787899b73db953b63d4e474bc8a68cd5e23e90dee76ff6ada3e2fd31
Commitment
62bfb6da9b72c2b53aa3cb34c2ae59c7ec12d7fb9b1d3232d952374b8b02b749
Range Proof
672 bytes (Bulletproof)
Memo
acf4b50a41a5325e698368a8bc930ab7609319aa09ccc1dafc17771d03ee2e5467420c38ef58c0a259f12c302a3b588c0f48ea1b2c37081adb915ee4403497764ace46d4dd2754f406affb81b615903717d42a3364488507282a967a34290ae247ce431133ca62187ad99091498facc9fec504af10f4f49c0096118e0f2324f3 (encrypted)
Stealth Address
861be744b85b07f974f18d75e9a4245b303641d166537b25c8b82951ab535e54
Commitment
aaa2722bf98fe673ce1c8b4bf028e2f8f53a685f4f0167bac3f07e599797562d
Range Proof
672 bytes (Bulletproof)
Memo
5537037fe3a3faae8bf3fb187af7c27be430b9466a00f7038c11b40e751b61e72b8df7a5936b0bf82e5a75e2f00f7d3e5fb851080f919666c787489365a6b114d436959ae00e4a3d95904be24c366791223542cdf086e555a855b4cbbb96e63abf8db708f356b14d520b27503f8d50eea58b7530141c1d98d1dc6ba1e8175f32 (encrypted)
Stealth Address
263e8ba36ef20dc3c87d4ec2933f4f1ef6cbbf0cd9edd943d05cea689a2bed10
Commitment
ae2feb8ee9b978468e30c47abbdac9a5f324300e2121e1c884a75c974a756c2f
Range Proof
672 bytes (Bulletproof)
Memo
9cc3fabcd66fc78480d790519396cbb4112d5db9ec1d6f7cec7a12cab47ed89feb47174cc8fc98b3b4405436c41bc86f02f754e74122545bf413b1ecb3f8d29a0345a19a24153f6af5ec9e75b2459f7329fb61250f48cd527bd8e5ceddafba63a4fd6b93f6909d8ca6c9da20d8677ec6ab9d16478ed95dcc9ca5ff0f2af147c3 (encrypted)