# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
be6a79913468651bb34f6f8635eb16ec930992c163c7aa7d3a40340eadb8245f
Pseudo Output
5616c443629c0d55f4eb0c401faed67bff21ae056bc58f7a50b8f99093fc4325
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
12c9a9107f5b4a3fdb68fb0d369c60e93f838fcc58c730fb3370d9f6e027e46a
Commitment
d82d1736ca0b64af306c56be54c0300bc33b2d7b5ca2c415d48c81b64bad7e01
Range Proof
672 bytes (Bulletproof)
Memo
a5851fa162c32c0379478e276e298f8497d451fac406a45ffeb0917855bb1ba7e283452ef45b2a66ce765d8ef051b40a107ac171ed934d07cbbc33076d90083b415ae6274d58cb16a36df5933b0e8c6de5eb3682b2a6d77464120b05f2e1048620759579a1df9197f487a25fc83cccfc19d74efdd3912cc004fea2477617726d (encrypted)
Stealth Address
c82251d7bda98ca397eb17af329a6294f20415265b39df59e060d1f6d4b64803
Commitment
0a51ee55519dfd4941447b78a001059b5001a193942e2a509289c4ceb8a4b759
Range Proof
672 bytes (Bulletproof)
Memo
23f471eb1462abb5143ec740713a15e30c998b124c618c77a630207386a3106f6bc3a49e0c11abf02fed68ce3898082ec56e8aa77670a2b454f2130a5977392ad0c2135f73ca876b56b0a7210c6061eb5f0f9c709805519274c1f5443bef389b339b0247dd2a16fe81415ec3978011e19d1805a5cb434256c0fc9e54ed815038 (encrypted)
Stealth Address
b4a8e8fd107ae8217873a5c26cc878a74b19b1d95c86282c6a91986ea5bdb177
Commitment
fca488502d0f903ae85ba6802dc80123fd59d1e8f00da0b831838ba83461d043
Range Proof
672 bytes (Bulletproof)
Memo
f4282af689a1baa354f05a012348a1a9f1d94a0ba2e86a88df5ac3e36e34cfc233c2358ad2db8043563ef448158f81ec3f65615afa1b2e4f65016e468c3cd3015a74f02d50e5492e9df02a51c644301fd75df4d9635c05f5c61a856e550d01f73e742036d22c90c60e197409a7a6ebd511ca18ad32379bf6415ac97b5b80a6ae (encrypted)