# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
00c2b9885fb24193d7ae118cfc761375e5eabef74fea5f75814f0e8c3b827e48
Pseudo Output
f281072f9f396d21c8b7b09597485309f70df2381b3e36748f92a2a340090e25
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
14d2dcf53cdb6a23a2a30240c84010aea19b7bf90833c62dbbd8e9e9338ada22
Commitment
4eceaba3352e38d8a4c6efc33af165824f75ca319287b6c759624793a8050809
Range Proof
672 bytes (Bulletproof)
Memo
45989b45bae11e2408b53a4eac91ca6d49e92a1becc5f03c1d376f0e6f7d6db9ddd3705986641822d02077d8f019a3578193bb9f77188bec4d17f0e50deb6b277e41a7bd4b8d8c516e4588735c8ef684cee45af0d433635457dd8584809bee4b8c10ff1716e64a020b1fe4f9404bb040411d7ed9e02cf72edbd51f981462e297 (encrypted)
Stealth Address
48f811c668ecdebc38e357c0752e2feaf3ba38d4fe486b8992be43711e465676
Commitment
e86af292de9adf49c2e458e130d758d8e2d81a3612787d8c96e0ed784660f60e
Range Proof
672 bytes (Bulletproof)
Memo
73b2110862a81b546fb1a87081be9017fdbb0dd26fc370edf1923622de62abb9e50233f2abfa0b3b90221380415c949d9815871be9d4b5fe19d05195292eb0eff472555664607599ec038bc3cd60ad2e17abddcd00bd002d77593fb05a9eb590a61f6b864a98dad8ed6f58712428b0a3701c1dd03d8660418c3818ee7742bc56 (encrypted)
Stealth Address
9aa07a78c021a4ff2a07d6cf8ba86e3e67752d7ba6a573a92a42095c06764933
Commitment
52c6bbe498af48363d3616fcc1e882b803da8605f97f31c169a57911b0cd1579
Range Proof
672 bytes (Bulletproof)
Memo
8de24ea538cc43b5fe1b7cfe3b904301083429647c842f9a8c8e0716a882cd122253b140be23e671965029883da931be0dc9ed74577ceb64f225ef9c52db6c301c862940c82ecbf7fdec0f6d2644fff21b0a849b04fdc431b606497ca9579e79a9db3cba419ec3bf09c338fce652fe87038320986e75e1f1d03f5b74b328ab85 (encrypted)