# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5218944f99cc9787d1f0e5f05bbafa3bfe4068e05cf472b717141c629274e12a
Pseudo Output
1c412915c17b1da707a23df11ce2e8e65e8e962a776636dc995dae2fba1c3141
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
34521c86dd8cae8674649c22a61470150dfabf0da00dfc4ccff8ea15f747eb36
Commitment
b80f75fe3befd54c5e297a06948cf3277796dbfb9085880945d78a460a0ff467
Range Proof
672 bytes (Bulletproof)
Memo
75832c7c1ae25d31ab55eba667410c206e754e4e300ac30c5c732d3dfdde932519eb27a31b939663fd4a391ecb077f3cb307d3134e3858fead98e1e99d3f493c2ccc9bfafe9375057d9bb9731757014c112c9d5a40773c9e2b98dd41230e0f80f9d65e5bca0e8c28479f1fb8dc1ef89fb372b87ae1c94709f9a5331cb92a9710 (encrypted)
Stealth Address
8ab2d6beeaa141ee97dd76efff0647d5d52e5b626d9ffbe54c15869fc1ef774e
Commitment
785e15b1368d54011bb40111d542cef74fa5ca4a0777b9f30e0ab18a2c80b636
Range Proof
672 bytes (Bulletproof)
Memo
0d1e121e8a4d0ea618be2a1d9e939fa975362f7c00e144b8da802dfb53fa0a123d9cdb892e43560a0a570f698861721c7eaadba8dc43f0919e2bdc211fea3dbe345eeb12a1b129d917a373bb48f19decb7ffa728f8affc2ae2400e73a46c2ee5d04139d20118cc51db96869785c8a1d603fb2f6fe3862702c3c04895cd752665 (encrypted)
Stealth Address
b2132cf1f7b76f030bca9f02e800d6cb219b78b754c821d7585dd42de01c4617
Commitment
fce23029da0dee4e85f142669ccd53fcc905ada845efc278f21c423d4d086138
Range Proof
672 bytes (Bulletproof)
Memo
335a52113a79530bb7b5bcdba1256fb00ee3f2a0bb7130d9106431f70ee339f91281f72599df205dfd6e0c836fc44bee7b2f6508ca3d237cc647f075b87e72f2cad3062e198c7f7aecc7ad3ed94af8ea5d90ab089257531af36c48b77a715d846914fc2d52414c8aa8f7a9ea677f56b67f8aea56658cc538915a5f9b87a16809 (encrypted)