# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
baa88fc6518d2951d78b743aa14ab1c70cb6c13d02f4bd6bce354d9a8c328a1b
Pseudo Output
cceaba0e5a51abdf7bd4ddbd0d1ec479d7b3113f582d01bebca441f1450f5020
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5e8de31b87c9963f431910da051560d482e053c82357dbdeaaa9d818cc821a17
Commitment
dc20321a08c2389009caa0d19593e9d4535b72cc5d53166a7306045b3d105277
Range Proof
672 bytes (Bulletproof)
Memo
3f77bd7233b8a73ef72e2b9fd8cfe093694fc10459eabb12d28673cffae18f442e67cb422947847249bf5ed643f82dd9fc1af2fa94440f67cb81c331b07cb4f60a3a5f274041d175227c4ecd8b9f973871b4178f12fdb32c96013ddcf974c416e0ee0ec7a803ca196da653950f1912929607220c406d53706849dc62ce3a9175 (encrypted)
Stealth Address
e2f93e3d068295951e1dd752704a8c1b450131d96d86c215006229ea8026ab47
Commitment
60e62617d07110deb14ee45b826dce7e9b1e47d246c0aa8f8c4296750be2703c
Range Proof
672 bytes (Bulletproof)
Memo
6ce36785f9360736a3f676cc83315a134bef07f4603e38c854efc8202cd6fd57da70e2d94a0d01a3c0caa2eef966ff27574e77b3d5feb94e2c6de1a704fbf070ba987c22885b01c7313aa956351105e50a17511cd57642b1875bd04e40f7971b08401c61949f8a2a03d6e7a987506b18f085c9de1c8a4df689d9af401d2b8a74 (encrypted)
Stealth Address
06d01f8831fd81db101eb0d645188b40ef5695608f446e3c21a41cc611d1965c
Commitment
92dc0a72d0cb7b6dec65a1e743e47120b73e1fcf4ca427bcadf2f867a0043422
Range Proof
672 bytes (Bulletproof)
Memo
e6517250c9ff50445181ee91a94dc0fe93043667c7d113a49bdf9cf18012cc571fd59d113f414fb9497ea5c7d1ab73e293c5eb91d7a1bfb001575e3cd6d10817444ffc3ff3c1fd46d8371bac1f790e38ca87f2c67baea4fe949c855fdcb287dd3d4d374e8cd39345c3660fb51ba449e57f5eaba7194c9427b316d0d963826875 (encrypted)