# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
040d192a83ac9355cf16fb2036e3b1a546be631ea406b2ae864f86b7accd741a
Pseudo Output
121ad7ea058b02decb8a9cd755d3f7c87473bd6531a0059bcd4e178cd6b76d0b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1ed240aa00a18ff6d4c7b842badcc5054d781b11af7eed839f645d4e7103d663
Commitment
58b3bb5cc1445f3b0d27a461e4bad2999e133f2f1c2a7d9f57788190378b3743
Range Proof
672 bytes (Bulletproof)
Memo
c511ca9007e3382cfcef35fdb232583f68457e002a277c5afafa60e7f3dd2767fc9e2e6db0555170a9dff619abf0e892365280afd88ed8f90985d42a2b7f6ac7c902c692d9a50499a3015be1d49f0179367a34a3dfc8b5a1c777f453d11abbbe1612cbb7526ca8649382d2dab730485af9d89402bddf45f6c27a2c3ce1b7984e (encrypted)
Stealth Address
b6e3048c6da699157f78479088d7421e2805034146aa5bb750159c570c099926
Commitment
743120dc1fc3e274ce79bbdb799a07ba50a1448bfa76b40725b0da3d6178e760
Range Proof
672 bytes (Bulletproof)
Memo
4975566bf29511860f1491ea95190bdadce63cea37bae417edd2cb41d956bd60954ca63195f76f168ae2be009ee0e23f402f00e3e1f651584c43bf351549de9937930d1eed798debd22a14127a618b3a2331e7efc426cb25e66eccc52f7e39a4e476c15bf4208ab1f16c86fd462773db0a9a9a19929bac0c19240019b9428063 (encrypted)
Stealth Address
f049a3e6c504018c9aa7288992972aea40b61ab45e22b87189ca6e4b24937a09
Commitment
8eba4b82c633f98d72671a2e46000158a51c1f1a39b65e1103425d2125812f12
Range Proof
672 bytes (Bulletproof)
Memo
29c1ba0e60221eabb2e920f158a8355e991d8836c18e9fc45bfe389302abb546c62fe7776636745f385b577b79a6f14cc09b850f730a4212e5311d3cd9c9cb4a20de0538d56049e1ac956f1f12710415a44f3d5a1bb0c3bd7d092a1cae5880654c6852b61d2ef18d4c77c905eded6ff3a8669acc413b9409e9b9b39e0d483ee1 (encrypted)