# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c4d7226969f2637a4ebd719fc94c9857d4266d1d55deba020ba387ff01ba9621
Pseudo Output
1e100141f29570bd8ad8d5f7b2ade2cfaf864c054611b1dd1d3c137cf436cb61
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f6322617fb233b3cc030bb67af8cb01d1dbf88efbdf9d05142fd32847a555e74
Commitment
da9ac13ac9e51093d6359ce0810f6d6b5543a33215fe9068ad819fa9bf11c513
Range Proof
672 bytes (Bulletproof)
Memo
df596967819369d30d299740107136720f3195554264ec31876b15ac23de99b1a9fac5189746b36ca6f0a789c4bdbb624c836e7b6ecd1692a8b17e3824af5ece6a5264d7929b006ceb2d556c054a04de077ba3e8057d976f2e3c275185cad1a10176ff83f3b241d4b18740b69a878c9f8d7b16b445a1e5ab28ecec870b191165 (encrypted)
Stealth Address
3c86bcc4c01fb030e8fd6bb8e71db4625f61e66a791c54efd8f7e4645d4aaa34
Commitment
e85a3bbb0c31d61b2e1302de51b0d585dc55bc9efe5ce967bf4b71c1b8008973
Range Proof
672 bytes (Bulletproof)
Memo
964a6de3067d71338b89c62f0398a4816bde0e2131001f25933c39a2ef6f3f1cd809a2410a298eaf6dcd16835d81d62e97729f7481b9251f634a6013dc3eff8fb006bc452725ae195c0ea07f0eedb78a40fd7f49c0db2baca11138da20b7ad67f55cfc7a178932509f0b75c0257394d21d48ac4145dff1bca92578f66f7bea8c (encrypted)
Stealth Address
1e783c2fc9d3e3c98c2177ed0ded897d264e0dce29d86c338a8f1935a7283159
Commitment
880c0835519a7425a4701a56224f0396dd95debed1f63d08cf5e7b8bc106a43d
Range Proof
672 bytes (Bulletproof)
Memo
6e4c90889714b6d6ed9139cca99a26cd6caabfe90e1f4bc5d114db6907c8e1b7ddc763c4a4d1045f72250bd6e9cd4020512e55715e6517a8bd41d2aa79c3e8daf07fca8a6ffb8b47ac9bc86bb78c3d2707661171dcd949e3e64a082bc88db18ec8179398c5e712168d549e6deb0b5030af48eeecd57f8a3a4b7fd2169b70ceff (encrypted)