# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d40b93321fd0ce190d5e03c92291a0615e1e2ebb415ed20560ba0505112b2a17
Pseudo Output
7c49b4160634fc7ca77380c2c15801226f7edcf6bc2c908ccae2c41430986652
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b2c93eef3244d665ca193e65ddd2f0e97a5b0196a74d85ad57b0b4b9e5f83e51
Commitment
6cf68b919b1ca750bfbc4e81241f98417f9c7e323d29a38cef70395915f29d27
Range Proof
672 bytes (Bulletproof)
Memo
a62db36a885d820dd78f521c4f5c5a54394819c3e265efb1f91989aeb3ba24825e4607708644df4167c72295d384cf5fdd0d804d67848fa91af34d99437aa03508cb3c2fe645a3f56c89833bf4129ffbd85caf124cc779c1c92d03ff174e3b9deb22d1251c481d3b7a671905a853fc042d7797d50ab04432f7c4ff4dedf1e86f (encrypted)
Stealth Address
487f48c760fb19f5a46b4695f7d62eb423e1748d34140b35fcd19f5ea89ed750
Commitment
0621cc4ef5822b668e2323fd56d96cc4b349c44da73954347aa4d2718b998722
Range Proof
672 bytes (Bulletproof)
Memo
0fcbb52a7f47530973d5c178a8c9775cb708a77689d8de3072e4301b78b6fdee99c404d44416781fbc75977e5d0525f5f92e6826af7533971e59bd2b922c5efd04b4b53fdfc0ddaf22a38544e0b4f43d58cd4b33afc37b79bf67079fe706e7b31bc97e171f9a3bd54131ceb44559c7ec72dd2f89b896dd125882628187eeccc2 (encrypted)
Stealth Address
4adc7b71ffb94d587f5746f4c16894939da6d2f04475a108b9dbd852f8fd6650
Commitment
1a6f95ccd84e6561a917e28a2a4765f75b3278198fed2985bd0cdd8facf13a7e
Range Proof
672 bytes (Bulletproof)
Memo
3eac6038adc19283c7d08b23ef9b3b7635d053420664119991e5f1340a88f8bb49fab42c9f6b3d9944ee4e92149eb22ae0bb468d1cd30fb9f218431e95b47fcb3b4cb967e239ee732c6bec20bb338ba3e655b581e1d2ca605bd9d62535b8af8a4d970548c274a4ab1dca57fef52324c0301bd255341102b48458c5e2704ae078 (encrypted)