# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5cb988dfd09441ff4a972e6bf2446ee62b6fa695cd9bfe2dc1cb71a9b0871c65
Pseudo Output
54c542b86943a98a8e45a48107909bc397ff7020e3ed6b49948a053bfe9ccc1d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c651721bcb40db42a7ee58b3977a7805a35d23399ae8ba8be45339f1e36a831c
Commitment
68cb7ff6adabf300ae0b1f13dc566f572ca9a6beee91213f4d9b263c753f8b4f
Range Proof
672 bytes (Bulletproof)
Memo
665eaaa2cc49ff917bb6640f28ae0dc629b4b3f9c5a0c199d536acf171ae7be577fe6de1a54ce6e466fc92a1f18eee9f9f3e2d6a054794f82284be68dcbb31e29b2a6b6cf7c852d91d9b89b7600144bdf673853bb4f03986b0b9f0bde633d3ebfca10ad6d828a89a0ae39dce591795efc97e5975c94745f85445195ea321a1ed (encrypted)
Stealth Address
78af7b0f4cec85e66d5657568f6e9663739610bb947f10178c95d89daf84af0d
Commitment
2ab6f6cee2073a76f4c7788333de0cfa49a2580316a9ea5779e0ee9a608e5d7e
Range Proof
672 bytes (Bulletproof)
Memo
bcb0d8ff675f165f3b6ff924da73979f0af4cb4a05f04c14d945e0e4ef6086e74fd51f98585fe4b30434b6a5b3aab57ad15d2d24ccef0fa9cd50969622d71533c6f219f16cd64a5e99d32a5a044b66bb8d6414202ece9c3592c71c8cb085d14d3c26f68f297b6501810e7626249b9dd271e07adc68e725f474a0d9031c2ae92b (encrypted)
Stealth Address
70ac504375ed1106ce07d8e3648c331353ddcd5bd72b9ff7ab087a3016294b69
Commitment
5c99a9e0c6af83ee945d8be15149a0752fff92363f8306eb85aac2288e72922e
Range Proof
672 bytes (Bulletproof)
Memo
22c3e55a99e6eeeb4937c6bcb59f89e341d38cd58634e2778a7e4c4d94e0e94915ee98f1129116a0a9b33fd93a1e4d144d20a924928741c00e2da6369cf9fdca3e9e26e3cabfb9eb8970bb35e6f69f901d3b2dd452515a27040922941dfdd4f97332cc6f0c7d958a369e03f707dd87188ffd33127f0a687e0c07da43bbd87d72 (encrypted)