# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7e1ad16cfa33cc580a45b5202a82fbe948e04733e1e2ce36ed92de96dab75b07
Pseudo Output
9e62b158ac2a8d37bfd01095d758aedceb14ade51cfaad7974b1cce3a7800503
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7c274e85b7011479027165402b49eb78a2a0a25c00b2454b54feb3305647a31c
Commitment
384e145c39ebfdc8ba50fd96109024b7d91004c8d82e3d90ef29d6a8d6a8633e
Range Proof
672 bytes (Bulletproof)
Memo
b841a23c7d6cd78f53393b5244e03d7795a4b70e305bdc994c4a1ffb472307af19146cbadc438708487a03699cf8bed953ee9965ec7f5a07997a75a132cb2129bc1cce668a1fb6118575c70b5a91e01effee38a04ad5cc48f638316e679eeb34c2d025e18bf7bb2f57af9086acf580540c8d02f1e6af94c0c206977225bafb97 (encrypted)
Stealth Address
688b8ff250aedd04b1052c36831f13b87bf6e13503a5e07c3c561ba47de18470
Commitment
cea0fa6c3d4761a6ca614b922001116007c4aa902caf07cc15e5e88451828f05
Range Proof
672 bytes (Bulletproof)
Memo
759595974aeab3d40e5c20c3a8301a8502214244384b71d468b8ff57bef3fe2d526f43584633baa4e1f746b14ad281287024b474e11fc2861a4e32561629c0b0ec5be7db4e0085eda30f7c3c239c9b44f799e6fe4e9107251232581ae7475ba912eb6136df3c8604dfe65f5cd0263f8ee32d731df4ce4411555881a7aef25902 (encrypted)
Stealth Address
4044269c6a08def11a24bc6e8f0224bf48e3887522cfc41cc106c843b6090d14
Commitment
a646bfe53dbe765a2398985c3441ee1fa9840f32a3bf2b41cc94662515e0dd4c
Range Proof
672 bytes (Bulletproof)
Memo
c78825a762f80e84d80dafcea6a34cb7d16a10a69998a7301ffc35549bd9a86b94f89e793c3e9d5a3af365e343cfa4b750f8e6a518124e1aeaaf1f9a6cf389c18b20a2267c8708e9f391f6f5a2ece97d7559cdba7ba60668fac4a14b446f760fc60812f1ac6a4ae37cf312fcac39671cb446920ce079a143d0e22a0752d5e23c (encrypted)