# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b297c82d94d4941b6f340f59260ce588dd21f4121d37a93ee337cf378659cb60
Pseudo Output
8c912a269d44baf1810bb3e6c4b21e34a61ebd30bb55f2b2031630b0da8e237b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e67574938ad4996c3cb44b0f252bafabdd3a105598331fad7a38f76e2c670a0c
Commitment
a6c164f8430b9cafd5b6ad3cd7b599166ab7a676e4aa7bd3b6b564d71dd24c7d
Range Proof
672 bytes (Bulletproof)
Memo
845f71b30f1fd91a13816e65835a375ea21b53d1b2bac1f8cda1e3d64c9c606f5e59ab0a94f207dad77fcec5322d0ffce7509437d35bd6ee5f4e56473420d53157c0c5f613f8177774e87a0516c1da1adab1e9eb19f73f0458ecf9a7ea7ba42837d1ce679e164b1771c9d1cebfbd6b2d2ace86ac191f40b108c7e0b783269020 (encrypted)
Stealth Address
5c0b7e1f227d734dcd4410e139c98a9dc450fac0b1e4771b5bcf0447c16ad961
Commitment
5270dba014e9bd7721e50f12d91fb248cc8965a2363504e4652bbddec3b91b3b
Range Proof
672 bytes (Bulletproof)
Memo
c6245975abc8c3b8aa363f930c013a3d792303c50f004dc91ee94a824b4282e5ac725076deb06e2d14df67a8e651334d4d24243a3ff9c1563718fa7b4d6fe1a5829fe626f853f562ddde202933eeadfda0e6567fef92e8e1de3eeb5bbf6be1c95a25ca0ab7edc73df0bff4e8b9a8803485d05e145be5f783a8a7f87c85a329c9 (encrypted)
Stealth Address
be9d685bbc2ee4f9a9d0eced924596b6708a09079a10b1a30427ac60ea740a2a
Commitment
9cecad28c57e63d9ae0d3103d46a9ea6b7c257cb88ffde0804b261476755ab7b
Range Proof
672 bytes (Bulletproof)
Memo
51b763d381ec78605943d72a6112e31cab6ef3f99ea61b4a5ebf4e01ce9f7e6aba298d5418ce8010ef926feab866682392452f5dbeb3f2840ce82dcf3067834610a9460a520780def280dd83dde1028ad6a01a5c9e76b01ca03582ab341dff7a5d26714447bcee8214f82b38747135e2bde66cf8081707c708fd0e058e1f0068 (encrypted)