# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
684bec6efe293a053df74515b08c7dce7eff408fb86b96378a42a91682652e66
Pseudo Output
5054ca1817618cfab936370de66075e59a09af4784090c3368d95cdfede4fd32
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
245021153ad7b0f78efbb1e6311b8c0be89be83367b50be37908c15a69910c1e
Commitment
c8d5ce2dbb49eb4bd675048db7d669e6ed61d75d973a1c75b1e4eefdcb07ff5a
Range Proof
672 bytes (Bulletproof)
Memo
3b42637af68d5b1f492637c6d32300bb21cb8e8bb6699bb63f44c271337773dade9a6acb697cc156334ad6346dbefb3ceeb5ff1b8202b91bf47d6273e2832175b49afe3956a479ac424a24603c4905ace6fddd2d1ec97e16b6751c5042a625b7d4a2777f4487ed14c17e81ab2076e7132e488d12057d2d93d3803dd65d16d3cd (encrypted)
Stealth Address
06b23a4513174233236d17a96abfbe756e99882113854bd2864c8d5b6ec50c06
Commitment
22f878bf51224e322f5d538a2eaa1bedd23e1918379b6060b36cdd2b60715e49
Range Proof
672 bytes (Bulletproof)
Memo
23643aacc6ea24ba93edf0bbeb3f13b10d0da8dc51ed7c85b4d45b3572d1a4b0c3d76ed1d829d987a631165e461c27777483fe2c256bcd2ae35b283eb1850a2976506b46a8beeda482df7d8e790bfe1b26652a4f45e8ba8b4fe133d65912551cf1fdcd251014c2c5daffe7c3e4405c0efa10ef51db66bde67e0973b1aa4cdaab (encrypted)
Stealth Address
28c8650ace268f164f51a25773d1c926d9e9cb9749ff1f1e998f5cd2e13ee65d
Commitment
5c0b1948bae0e7318a2679cc2c4fa57d21466161666c620aacdffaf077df2539
Range Proof
672 bytes (Bulletproof)
Memo
1763835521638d47149435d2dbfc49d5d47aa600ea00efd091ba23b733ac326959a107121cb702c6b3c8dbb624c1a263b5ad4c4cf63566558b0eebfd2e3045549a1ad0f366a6bc9e9e0e9e47bf3b59ef8b83cd7035fd40ec456ba8fa1613b7e2dc4f5b0632f9e0aee25beb989620662c518e733a1a1dd26e92f233a7647b8be6 (encrypted)