# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2efbe1f88dcfaa433c30a2e6da8a3fef0da69e5d68d0b485cac35cc7a801580c
Pseudo Output
1437b507bb7f413fad41216004155fc3246aa741cb1ac425decb2fae8202af03
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b43d1bc960607e6323c5e191e32c06ae2145388a22362fd0b44ed17823b1af14
Commitment
6409f4c4d3b52951b532fab350e3f101e55f4f9d235e3ed5a33906441107f204
Range Proof
672 bytes (Bulletproof)
Memo
a95329dd64923d8d7d604c850cb79f3e59566542b04795c69295cf24d71f4a204179dc1fc60816b186b690b749a37b812a49434af6a5403a93e524c26bab312c2fda902bc0c9551079fccc86485fe77d3f2a1bad17021b4089137714fa00e501755a54f3ff3950112fabd97c298fa5c09f9f31ba986216a77fe3d439d42ac1c0 (encrypted)
Stealth Address
ec9eeb45d720fdca07ba3ff3a63f5217dc1bb0e0b8dabc27f58adfe31ad2b10b
Commitment
5606ea000b8e8d7f5c70a3f98e0f3c48bbe93813acd3f09eff31e4d5177e0c37
Range Proof
672 bytes (Bulletproof)
Memo
e2a073c94a6ad2ed052bd4db21af3027cb01c5f5e24b91c0e90a4af52adb7f294cbcb5aaf79997e35c7cff0890b78db457a02655334ddec4c9d356027161a6a04e59a873ffb296b4b91d3386f03e89f138c67f93e1dc5a80a065aef53a23428c7b757ea5fed9b6d10a973d194fc5dc7052d34312f31280fea845eb2d4700b8ae (encrypted)
Stealth Address
b2f4d5a6bae3cba0a624b866d8fa0277537628ebf65b279c0141111699bca676
Commitment
9e96597389d206d6436f1608cabd0f999921837f6681fba55076d41b207c6149
Range Proof
672 bytes (Bulletproof)
Memo
5d6c7adb8e9526e4728e746e35794dca7a6005e63c97dc7ccb4509f5e6b623bc29ff7e1a6c3dbf12042ecc9ba645519d161fbf4a29f3560b3865ebf846a1c1f952e00d597411b39b8deb7272036e865565da8db68c465cbc8eabf2de69a95af58f087ad4076455178fa0149a7e6e75e509bd714936ebe7f6aa8895682216f62f (encrypted)