# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
20eebb211e0db28276117f2981cfa3d7ceb17024831706f20c0a068d7245f215
Pseudo Output
9ceaf89759a1812acbcc35bdf10696cb1f81d42bce0dfae1f373e566f8bc745b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ccfc0d3308b89e4e07d259ac672a8da68b30f2d46390fdd2338e5a11ba350576
Commitment
5a52f318bcfadf4b6d846c27d4c56ed5fc89b3dc02a2be6043a0b8664612a84e
Range Proof
672 bytes (Bulletproof)
Memo
3e38bad0567841ae5f05332f2eda2d30e691d432da86996d4a38508d8f94e37fb9d2746fa7377ed3326bfdc58d3e9bf57cba2c62a9e840b764556dc3a304b68ae03eb2c1b587b62208c4b178d59fe833ffeb1d03d327ff7a6f7fc9b6bce6bdd1926681daae6c5f7825d8db304545726ba71ce304d126e7fbb80159b0aad6dca8 (encrypted)
Stealth Address
e44989ee65585e523709e1e1c3c7dbcb7147ec05d2a831d0b8c3198d24df701b
Commitment
6c22b9d6a60c885b030a96ab5af52cd64729e7ca0e8fb58c8a2759417168a435
Range Proof
672 bytes (Bulletproof)
Memo
7533819c89f9155f8d16b292de9b930e566c4e14ff78458a652a6efc5726c81776de718d7c55c8d51c0ed5ce1c4e370c09eddf46dfeb759e3af80682aed56902276d5d531fd2851dc7cdcce9de3ff3f8946f12eb94cc01ac55e57dfcbfd278477bfce0212138d13ae04c89efe36ea9764ea6d4789f118ff4e403f1edac41dd31 (encrypted)
Stealth Address
80f28d056b5b61bd058e56c03bcbae12aaf72b92a93655442171575cd9377170
Commitment
9cb8f31b6c0bb2b8a01539b7057a6e9a8631f9bc756b2f58d195f948ee78116a
Range Proof
672 bytes (Bulletproof)
Memo
2327c07af2c929c0565311cbedb5215ae9850f55085d394bcbfcd303ee2245320b25d85afb7f751a9153fd6712c83993a2e64f9fac5a55e315a6fa629b0327727161a04241fdca68ccc6b85079f5c64e7e8d1c229dec22460f8be21d67b918ba6e7120219d3b788ce38ceb12c1d33fa1ee9d50e62e6e96aba4a17ea475ad4530 (encrypted)