# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
54cad70ffa21160edf6dc6c6dc87bad1c8de3042d6ce51f59e4f1e622af9fb2b
Pseudo Output
78b259c83c1fbf35bb7df3ab13d08c0a16ca323ef7b6eed96335fbc545ae5600
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3c090231d629e1695f81180475879cdcdf438beea95af0ac3c8930b73f9f0e64
Commitment
9692aef5a8de6953fec0cd55654818afbe8c988e094e422cdf57d0664f47593c
Range Proof
672 bytes (Bulletproof)
Memo
e06ff2051df4b72dde3766358fe6b7c4391e3493d72f3a1c0117f2b5c62f89d8a94e659f63a554c6d929291a948146d7d7f2864beadb3a6c0ce7bb9d3576c310c11116b8a963a6d48eed7e068a60dc77f9994ebfea4896436e8d9f6870d8b56fbfb377ddc68a7e7a3f4a97e029c2f7aafa73c6409f49c3e00f5e796a19f5bb48 (encrypted)
Stealth Address
54bbfd5072c55e41f2bf634421d01f556067e996dcde52bc19f784618cfc2668
Commitment
ee407a594da8e6f3c3ee3d68d981967fd2e091120360f4a3b135a54446b4cb28
Range Proof
672 bytes (Bulletproof)
Memo
a7a2fc4c5982191a846e1510b1f84e292b05ecc6c7a2d835b0b59940b96297c998ecfbb86c01faf5a6a6e75ea829145d3e0372061423775531ea757c5f405d3de70d31b63ca2cf91df140ac034b441624f106d9db45a2908c1da6fc319576b7d9c28e59842e3625b7192b6d77224b997cc932545ad1db67e350f32ea6ee711b1 (encrypted)
Stealth Address
70771bc224c1f5f69f7bc7e046c04c4f9a1393115fc0815d9f6599ed5d588f44
Commitment
72d67a698cb7c14c14be7435420ed69c4950133eb7c7fa09e7cb5885423bbd77
Range Proof
672 bytes (Bulletproof)
Memo
762f5e8aa3cafc3c5a7eee988fe97301cf66acabb89f740bf36ff3a95a2a84f11366c8ecf99603cb016d7f345c418ed552018db97c67d8ee6277a242a7038324e80d27a9e493477c869e43ba41740daa636e9c83d26053a5fb80e615b1298aaf35baab0047114a45aeb719ab18cbe31ec0d129afcd9c7f7f9e878878fe8e3fb5 (encrypted)