# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2e32763a4e13dd4bda5b1c9702f8dc5c965fc2fb73d71a9c0320e88c5b22322c
Pseudo Output
b6fbd2faa936c3641957bf66dca42a2f482541e4f70cebd3e7d9bcd0b5409023
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
10e66e677357343d036d45eb30e9319bfade47a85864676d76d140358cebcf28
Commitment
5e40eefd6cc5e1acddfde31de64e7093a28ff1867e8941e34832e3a33605302b
Range Proof
672 bytes (Bulletproof)
Memo
4d3a8d3f8355437e25482dd701e4981821835ba220765c1d6729a5a5332428910e68d423c70f11c3ac1ee682109a7871d00577fd88fadf69f23adf73a09b5073a9154c7e6b29c4583bad94db2c8151160574091eb7e1b021016430f48408591f616edbd94dd6379ffe3bee0a878aafb8313ef6671530297fab1433a02fba8be9 (encrypted)
Stealth Address
769ddff87075002a46c4b767a5fb95a56aa78abe46eeac0567bc308bff1a5e5d
Commitment
fe1b664c3c830f7322add1732253a4ca3919f5195553bd9a4ea35405d5085b6d
Range Proof
672 bytes (Bulletproof)
Memo
8a3fe7c7168e056298c5d0503d67acdfb7c53d8cec5e006a79ec21a2632554871abe7214b2dc38c3d69f7b6bf8551a34cfa14d44265ffa5a9fe7ff80a21fddc6b6994a0b977ba1096496d1e0a5c7dce9ae8b6d1156e5f881edd8e78ffae873ca52965e99bffef1cdf734f32c7f503276f8b2dd27858f6b0ce6d20c6c6f72d171 (encrypted)
Stealth Address
d4556921de7f5db37dc8dc31ba90bd25c631044b33c8ef087f5d12a297c2ff48
Commitment
ecf44c38aa466fa1b54974b2826de4d01d1da538bc4497ff74e1b06f8557f153
Range Proof
672 bytes (Bulletproof)
Memo
78dc1d4b3bcfcdce4206fb3f18cfe2bd77a6de6b5ec8039bf0c7ac421419562b85a08269d0e54c245d587d8626a6f2efb8a5af0228348e5c7469231ce9ed1840dc44b28ad26b93a9aaf5143f659d07bcfe5362a1c73230d29503d44eb7a6752f1811c1cef0e1a5a917bf11e0752a25079db65d826101a4c3858318e156bc9336 (encrypted)