# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
be4c9b0db497b990a4efaecb17f9a194e2556fb906bc1760212d63e1bad09257
Pseudo Output
6c3b7f6ce64cbe681fb77f378d98c071f8f4044bbe759e7e714b915de5850649
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
642ea244c748ed352b249c0b4b540a166c53012dcbe0cf4ab562d7e6c6c53a0e
Commitment
88a97c6dc98a1463d31f8488c08428e9138ff55e0cd45cde95f95fcb09254609
Range Proof
672 bytes (Bulletproof)
Memo
19f634b0891d205de578b3bc3ad49b20d0d34ea030dac35da38646251cc93643aa57c053e12f419f27ff4216b334c6ca0c1bfaf194eea49ffc00320265998292963ddae51b53feef81229b47962d74ea3875ae6d572582dec32da6aab849c8f10ec003204bec63a924610cefead5082536ad62a5cc4c1e61cbad989ad3e04589 (encrypted)
Stealth Address
d6240708e2d40dc52bdf7eed5fb897e0f4cd4da100497909955a921403be965a
Commitment
8ac9fb0ac08d6ab72ddc3d843e73621c7ec5a61e3f4c7b9bd033972a1cae856f
Range Proof
672 bytes (Bulletproof)
Memo
9ada76acb71fd5dce988ad105bd580e76392d595baeb438b37133e9e4c7c412b1212943ac84309737a0536f1b69db8071de29d8c9114622d7461b3846325de39e9e87205885e9e8bb7263af2c0aff3d6eb6f014f5d8fb76bc2e3eb9964fdd231c2b4b1790e59e20768acdcfaaa2cbe2d4ea59cfb8a1d3db7dbeb0eaedf9b33d9 (encrypted)
Stealth Address
04bb33d9ff61d83bc108698b5b765200443c056165a801156afd927f3de0a901
Commitment
f2110952cf1c2d36347f0277e518bb6472b1b8c3ceb0ec89ed3775a73c6eb36d
Range Proof
672 bytes (Bulletproof)
Memo
c513f42c67f2f8a685a0b75939433458a8822d6902bd98854f8b982fd57134c370b8f273e6bfd6bd68cbedca3232a2dc058c25df68e7e86fdddbeabba9a189f286a42d014f202aee8351414b0e41f1b0a3f9449dea991033c3826309f2ec22aebc74a68c397a175b5bb8629f37c23cf8554e43ed94fc990ab7a8489de5bbd891 (encrypted)