# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c08b3535be6b553a15c63520f4f45e950ca7ce7a7db6bb8c5f8dea649e574d09
Pseudo Output
560da533d95e3bf3a6eba851ad888e934f00a6faf7cd7f45ea46180247dd9766
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
682da98120f360d4568a362bf044dad7584b2eefff1b63afe92ccb7c13248a4c
Commitment
4c7dec17f6da6db17cbf06a277b331aa59e2c88ad667df037239cf51bae2f04a
Range Proof
672 bytes (Bulletproof)
Memo
350e76090240928849c94dc20d63c649bbb7313f8eb26738447c1df5e8cdcd4e7feb50266bb9a595d1b96c1e70e42b83af1ca9352adca05917d243f3927d8f97080fe73b60f0ea86c600fa8a865965677910d4d15fb5858907c2e3e8d909b14ae27d5e6dd7ee4c0f18eceec7f64655e617a13367793d67979f91317a23d02e3f (encrypted)
Stealth Address
72e6f7b094af0df7fe822d288313e75e8281a8cc2412685a8eceedbe56588439
Commitment
501941c79b9813e5e54a86517785399bc3185547fdeda7bfcd836484be9cb90a
Range Proof
672 bytes (Bulletproof)
Memo
294b0b7de4b0d3edbddcd519ad27499a531683d0c52a3941620342bf76de7cffd056d071fdbe58da275682f380ba7efbd26b8c44aa69378573682e7384c23b85daee1f319709343e341c34dd4f5eaa402fb2e343213abbc4db32c8b34673b22c2c2c3c91e6447f88a4b9f1ce7af0344a7dc579dda72f2be7f6fc250608f75919 (encrypted)
Stealth Address
1cbb2d9d9c9872dd0651f037b0df7f60ce22483494b2c7f79e84e86747764b4c
Commitment
0e7677333f7d959f737e8480b408ebeb1a1f9645010a21cc2b5e67fd8360e772
Range Proof
672 bytes (Bulletproof)
Memo
44582e542f9e6d79e46771d825f62f22fba667ea1804d3b84c3319f7582c1186faaffdf06b94dae16d7a8d9e25385680bb8cb2917bca6a456e6874a193a3abc692a91dba8b33fb103798e2bd04d6581fe31d99cd3d3e950461a625dae77b9f57789a5438ecf3da0c3d0c6ace6b930487a0c6ac496e8a7f4bc6ef256e34a62a56 (encrypted)