# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f0b05c1aa7c129187bc9091c9525d47301a7ba6247f16fea09294c7badc82231
Pseudo Output
aa13759231c33c5babf4c6fdb2cf0ff0aebf0e24aba56c3899f3a388249c3f01
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
94d2c08f8ef6698eb0a3d8da0099677a289dc16de12f6c75e45f0ab60562d20d
Commitment
461abc26b691435640121333a1bad8c34a72f1a7bda72922392b8c437ba76b14
Range Proof
672 bytes (Bulletproof)
Memo
0d88a250525d909e60243cbf3b635bb36b5c4ebd0ddd5c1dd31f4df97f246bc93e3bca1071aa2cf517b3b4cccf4eaa6f6aa5e827abd4416ac2e87c322ed44def75da2e9119f28440ede81f907ec276be050246be29821dbad50bc3972bcf867ffb648c576dba6c30217522cd9d45bf25fcb55cb0d9b8b4f2912e5bf19eb41118 (encrypted)
Stealth Address
687c0ab466866d155bc0e696b9b31b7daf1ae011331dd6dbc548c1c1349d9c63
Commitment
1ea702a4273699ea1bd6e949c5c8eb4d92a9f8fb6fbaa7160fa9fe3406496f73
Range Proof
672 bytes (Bulletproof)
Memo
ec688b8952fa13548480f01ede8370824eb2ce1d2e2c81b410d0cc01b78ad7bd0925e2328f5a78bd745c9b665093533501d4ff57a302783da3d702e120007261123ef5df2eae15c89a8d0a5b8bee31b80ec51f59446da08e59cfb4949894bf8457f647d424c82dd1e0dfa22fa8496714333dee44e672ecc520402500e398a7f3 (encrypted)
Stealth Address
ea7dcd4d3f84bb9d9be167b94d61602b80052214296b8c22d38e10f0dba5f336
Commitment
2209e281e9af5a2e03f11d17fbae2b632371dfeec32d12abbd26f33bc25a1118
Range Proof
672 bytes (Bulletproof)
Memo
d3f7a6faa8f4edba4904136cc630fe27297f56b1cf2c22663fbb426f3c7a1c06feac09fa083740e654f19a4ba4b1c320e8c0cee478b7e67f589f67ccf228343c00f68cf72b56701542a252f83210eb58f5c3c0ec3562e878849392c6ac2deef1c98f14edb18cd379e1359004c4f758cd5afcd51db76f1b3ac42221300f30254e (encrypted)