# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7613b6e1f67b7d83acdd6dc01b60d905fda4a75ca67bf5bac7f680d40d479620
Pseudo Output
72b96dbff619a3fec5fce4f8157c0febf942b9decdd56bb357494e3cbdf1435c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
24ca1b0acc0a6aafd5654b29f73f493a5b21fde3b29c56900e461a938faf4c73
Commitment
e49c96b7005c3e79189fb34739d7e549bc3156d595af999eba1c2c4b4700106d
Range Proof
672 bytes (Bulletproof)
Memo
61d943c58b0eb7e2010d3d6a432b34f3bbf4cc59d17379f52b89c2e98a6ff7a2ebf5925fa4e19edf05d22823d237c155f9d80ae81a6e1adac6d77b4d1ee6118c7ab36db2f6426e921ef51e19406ab198700fa5bf55475ca467e9aa391b193e5d34853a67ad603db9ccd023204730800968cc3194f855548bf75cf2c5c112eb8b (encrypted)
Stealth Address
e88d4f7a71dc3919f8705a170c24c7589770037f73648b19a0d0394cbad08536
Commitment
684561e2e2da02f4fe351cd4c2a73905733c289a01a4c8eafbcce8ec93f65804
Range Proof
672 bytes (Bulletproof)
Memo
f567ccf967420afedb01bf19f83cb4bd557f013ed1c6b5ea8dc32402319932217f11be053b7ee82c814c1562f4782a0abe824dfbb0b476de688781c7729c7adeb80927fa187e1f6ccc2c38372bc06582e37ed92320cc633ee83139e490574802f0801a16e0309c65dc6cc4d1d9c07dab6db43338842364fa936946a84a05b489 (encrypted)
Stealth Address
32c2f0dbb23e9771d20c67471811b71b14b468fb99b94f891a0e273d2f18481b
Commitment
56e74971fdaf8efa3e5536bb7f6fc12ee95393016bd66347399cf782328f2a7d
Range Proof
672 bytes (Bulletproof)
Memo
cd5e4c64a0f9ef1a51a460ff516ce2da47048e44014e37af2822ff0270831263df69a55ef6d98dd5c8b1fe775cc068aa8e1fa3406eaf52ac06dc0dc29dffee6aaa306d8cda914b930b0a263d7015b3291912009466503016ae6877849e2bbdf116e0701e250a2db4da667215e69ab798da255f5ac4a1808c3de380c4b9efabd7 (encrypted)