# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d61d47c5110906d8f7ea7655d712d5c2c1d8a1724b086f0661760027f193a237
Pseudo Output
9063576746e0f38ef4f5ebb705ee5aaa40e5bebed80544fc87316bbc5c1fe03f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ba4423f55fadb4cf0453310e58ae4edf6fcf646d30a9cd7fcd2285319874fa07
Commitment
3e15937f446dc60d4b08c7e676dc5f75f8817cc6600686b405b56ddd30660809
Range Proof
672 bytes (Bulletproof)
Memo
a2c9a258ca908d5ad8f7ead68ea76d25d43052b90803d84566635dacdc0c71b1699c86291ded9f87332a40100d611e4495e9a41b1d721188cb34267a445c6606a94f90693e3d6b3e4e48f616fcb9c160d9a97f2c2ac47aafce9db2e9e5252e06b72065771a11b22e9a8e9cd8932d75502b1b4293fb9ab75ad060d775758f4129 (encrypted)
Stealth Address
da2fb4e9203a1a1dabc903363977e5583033e5014c8e498db752a5371a3cdf5c
Commitment
c263c16e2adf717df969150269325b06afaefc24a591c85b819982d6b24c1c2e
Range Proof
672 bytes (Bulletproof)
Memo
584b3cbca47be85837574b0b998a4a61f7829e34ccd9b5fc2d73450426f22df857119939623a7acfc9df731df29ca583bbda49fbacb0516934bfee87e97aa8c6887c7decc826ac55cf9fc538fd383e12d84e8e5795a8e57ce92fbfdd5a70f1aeef5017657cd4bc64a5bdac898bd9705d2a3f36dd6dd89b7e4c63b739623ffde5 (encrypted)
Stealth Address
6eda418753aa1e86a0a4864779dcadb6702e858312b60e7ac0d650d96c2ed87b
Commitment
1e9097e3dcb995eb46e2f659de2177aec605b8b3cd8cb3b0f0164172ee182b44
Range Proof
672 bytes (Bulletproof)
Memo
0cadcbc08b280d61ae39fbe24ca44cd2765328fbe9771d39d601c805fa54dc87e7fc82c9476e5a17df1506bc8c4a5b2c3e610441fb3433267b3e05ad0802e67b7fcb887bba1f9514244540f3ef679b5089b750e1cfc91bb3d743a3a72802ebd782adb3dd127ab7d621dc3538d961647bb47b3cdb0cdd1611dca9bd9b25bc59c7 (encrypted)