# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6c95e8bbb84777eec6865e620d17e3f723ad24ab115b32cad309f1156beca520
Pseudo Output
0e3820228e8c9d1a217dd1ca36b4701695e24392f20016f1be0a2b693884ff0c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ca964fbda2c1393d419fa74e48182dee599836e2cadb5408c22afbd2a722ca41
Commitment
f0718a7167225fd0395c0343744bb14b934042f7bf167a1b36826c27f36be94f
Range Proof
672 bytes (Bulletproof)
Memo
64fc0ac3f85bb17a26005234f029d3b67a6a1425c7eaa27159e5e9057eb3212bc07c02214b0b747cca7f4b4ef60d1da6f54fd9a965737752d47e0cc5e85a903bab5bdc7005b7003a80f0f8c5956469d3ee8941742bf284faa8cc3b3b58319176545a5708b19e1f178cabad4b6c35f76c8d61463502c0d9caca160e3a50c1be91 (encrypted)
Stealth Address
ee4b7692852ab31e415ae0867f1efd67cb5284058b08d0730df3d69786585413
Commitment
5a0ede0421fcd78318099a2162d6dc1026028b3c8134992075d50da66938dd63
Range Proof
672 bytes (Bulletproof)
Memo
acca558577fb43b863783b0c43f5c1444c0b6a3adbe1368215c5b0d1cdda9f0b7a3627c49defe9d835f78c9d69d2ff28c668c62a405f13cd010d9efa01467f82c321cd3e75f4766d8ff2abf93620dd768e6b5d3f5d40453c50820ad9fd7ac4802a51db3ab429c4407978a8bb7258b18d5fee4205db6953a083a20f2290c40bc8 (encrypted)
Stealth Address
3ed11482ff3ebd4a83f9d50cefcbd9829143707df81757cacfa0e6fc056f395d
Commitment
cc816ca6d6f78faa4a5b42b4e8ff77d083ae733cb399478399fc810691b38f3a
Range Proof
672 bytes (Bulletproof)
Memo
d45d88f87fbc787b05453019f0c7231c3244d6354d2f993ce0ac3df021ddafd64d0456a973c3080f5f00010dd46b07a43b5fc0c0cc32a53983716268ecc2fc7f452a577f9bc75499c48e5662af74b47ef4cf42ff3e4af355bce7c9320ec21a7544ffb1fa7d1d02942a7b3ffae36bda03b6ab450cfd76e281eaacf552925e218e (encrypted)