# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
82901cdfe23ecfc400800baad10a50a5ca259f20b567d8ab93d052a2f012e20e
Pseudo Output
88f0fe52441f8266877146d7a516c818c5baabed8a01c1eaf1ca5815baab7950
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
32fb9353d262d5daab48a4dff6cc03248152f2af9ef97650868ecfc567d1726f
Commitment
c4654a9411fb65783ca2c422ecb76ba408f35cad583f5a99f90bec3a9c243035
Range Proof
672 bytes (Bulletproof)
Memo
2239ef2cb38e38989153462fefdfe40d8d5a361208793fbac36c2c91cad395e7726b6b89e055bc1b0b3a706820870a2ec0a8a9418c02b74625c9bacbef8d310b13f97984cacab8ea460c264cacb81c6d9c350e75efd0bfb83b8cd6f6e6ef64552791c3d52f849a371a3273ff9e8d98c2ddb91e2577434b3f36110b8d8197488c (encrypted)
Stealth Address
1868f99ec23bbf2dc06a0e2def61cfdd0f0861c1ea15a192afa3389836ed7928
Commitment
c2fe5368f38de16f8cfb78647e6ea53115b750b4f7438293d4a315ed3eed9850
Range Proof
672 bytes (Bulletproof)
Memo
189c2b84e9e4f3cd3c71fb9e2eee02f410d1c3e865d601447797225a5b84e658ea2b578066774d1de692fb1dc6573a7c973a3cc344cdf02cee5309d24c257161e18c2828b173c0a3e20f76f52f1e742ac9c80a637e5ceac594d2c877a19c6b8a2c4eecf15785a1b0f3134796af86d45349f4b45580454d758c2153602e6f1f5d (encrypted)
Stealth Address
c265482b31c8e8ac371a6213776941825f5f2c06258099fd9436f25d15c8cb4a
Commitment
32470b16a687ee4d50d0d4f2101546a06bacfe010f2f3cf5a553fe59fc6fa862
Range Proof
672 bytes (Bulletproof)
Memo
b12e81c5b7a966f686d2f7fb73bca041482e7e1bd1700fa2293b30a137e3d7ef2a937a328da988eab8c0e55bef5a78d1cee5c4116cbf51ce3af0695332617347b80f0575a4e3cf8b97bf6db082123285ff545aca3296f1aec23d57839183d7bdcf708a68ea9664899ac70056d9eda309252b738f7ac40a0786066ed238505e32 (encrypted)