# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b46258646d07d30089222a2a9b2598c9174fa07179efa7696ddee7e5c638722d
Pseudo Output
6c5fc2c9864d025bb74d6477e5af724ab7a0b9687a14b5a17e207d68ae935538
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
84d54e1e5b2f989fac623f7ff6f4a34df4917fbbbb49b0cc49d941eec0c04670
Commitment
96626e037f428bf90d3369b9460e5b71bc55df529f224d67dc8eccb2b4ec504a
Range Proof
672 bytes (Bulletproof)
Memo
080a14fdeb4d1e64c5f480d738c92aa3e6c944905d660a23df480e433c797bfa9a67778838837a6c8e9b1019f8bbafacce30048cb3a293e437b8282ae8f2d5c5be7f99cad6a56414b73bc27fd010eb6236de043044845434f883b30f60ac685982e2baac7d11db015fea4b423e02ef12c366d25f4482671cf823e39c471ccc3e (encrypted)
Stealth Address
40266855c48a8221387e9f9006b5b2083f32abfe4d101e806871f7de05217738
Commitment
0eb0adc470a90ca660b7122d24a071c50b343079a8672eb068af5a6de4e2612e
Range Proof
672 bytes (Bulletproof)
Memo
738446a0b58bead9684beeb1f6427bbf538ed1963dcbbff0b83f521a19cf8fb8316f99d1344165af64ab72881092d76867df917d430022ea550642ecfd1cca747f8d5ae460cd1c31a8550c0cdf4b10ee15d98a1a4b9dbd0cb0d9224b9311939ca8fe83b3c71a5d199f4a3025642f68b498995e7f3627d65863ba4426a852e3e3 (encrypted)
Stealth Address
ec36fa1fe650ef6735b600360868bca26f11b3fc93ab005630c66d5b4ebe7c52
Commitment
e0080a8ea798d7a5335856cd1b7194a3bccc815156a7e9fd3888c8235b64487e
Range Proof
672 bytes (Bulletproof)
Memo
4b9af39324fd1420b51ec6c2b2ddbc9978b738120711e02616b074715e7fc7698be40d6fced5aa328a0502d136954130d424bc16cc627effe0c69d064beaddcd26eb739f3199af51bc8767b84eb4290692073b655142b96ed6aa9801c264499a957b4102f09bbeb0d60fc7926aa74bb7292c021237766a1e6e7fbf685044b492 (encrypted)