# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7c15f8d24fddcebaaafe31b08ab90ed3eff58e5b79de748eb99876adceb5ee59
Pseudo Output
529c6283d8f2d5118b64a90905e751a74c53f07d3acb58b305c6448c982dfd18
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ac94a63b9d803c3dfbe284252e5c7229622d09427bffc928645e82b9088ccd7e
Commitment
8e8e0df9a321fb76f1db45d56f191c9a41badbe4c22957e887a470a0e62aba0a
Range Proof
672 bytes (Bulletproof)
Memo
0348abf01f61ae1cdbe570fa60004c94d94e57f3993d36a561c3f2f547367a60ccefef6cf36419bc71ebd728bea592a9015365834ebc2873ea495e1ddb1fb7a4435f82346860f7bf0d107fcfb5949368b227b3cbce928b0cab420036fa4bbbd181ed96aa62ff8a975e3f52e718ab1057056ca4461a290f40ed967c65ff6b9e84 (encrypted)
Stealth Address
12f366fa68409ef8a09c9ab9b5b60111e166e5f63088188286d0af941d3dd300
Commitment
96694b3fe2a51501129ae78bdd1de0898cc326abfa73a4cd5055e5bc81ccbd1c
Range Proof
672 bytes (Bulletproof)
Memo
ff60d2a41ab12c185ae0d8e223a0ceb9ee26ae2926c15237903966831fe0e1170be392e95a9cd5728863e3fcef373c11c1019bf75e87acc715cdce7037fe7cd9c32cd1cffe406a2afa610bfb58553a48b221cc754365bfcc3bfb9819a1f8a16ef0061b7a307a619c5272b1e654268f99ed112bfc3e0f39a10540266e2619eb05 (encrypted)
Stealth Address
76c18ec96ddd340454fcae9c9572358fccdb6e16163392c45f4510a9e3eee314
Commitment
b67c56c64e5e51001f669f8cb6910ed0af3849dbb361cc8dd45a5a837db6d11f
Range Proof
672 bytes (Bulletproof)
Memo
2ac9c85992045e4ab29f474d6b2819614ac588ee04883aeaf9452882c1e5a2f1f511ca7e519979125bc909a6fa710ce6bf67ee2692faf490a189210a9c87455141f0805aa4ad63bba2bad93a6ab376f1e289589bdde3563b360e5dbe5470c6b5e2b4dc0b4d4537a51eea3c5f939796e039bdf918f9ad06acd8651145c04f8dab (encrypted)