# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9e817ff6260c81a05a6debe07a0fb99ce68104ec4455ad9efce191b265bcbc3e
Pseudo Output
8ab0757a53717b11825792deb091b0ba56274b16dd3cc1b75544d3e4d58d7642
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
dc963d2bb45941edf29c6d9ae0a28b2d17cfeca6dadbfe1ba8927a15c238d467
Commitment
f2afdee5b26b68c1cb5708f980af991b2f82d815adde2cc17de0fba9d562e846
Range Proof
672 bytes (Bulletproof)
Memo
4b32c77d33d300688316634f6f0579649e8b0071086f4067222b986019a2c44363ab0c1f110d2ae6642bc3f4f8c3b3f4934275a9321a51a169c9618a48acba7a557f891b8baa7ff19943975f04b4c5e5c271a28bbdd22af696623a2ce4140399598553d56fbd720bd3841b86cc300cc145043e6119e5256437173307c1c40483 (encrypted)
Stealth Address
6c82f52f901b2e4b1ccaf6269aaa0fdb369f4fba83ca7827bdeff2ded707f102
Commitment
08ab9b35c45983c02f97e527407b09f2b673466bbd780f730ffeb13e19610418
Range Proof
672 bytes (Bulletproof)
Memo
96ad6217879a5f3a6f2a45b0ea8301ac6be2750c2e07c995ce4101805f5b317386bedd30d8cbbb2952f90e69c06c23996161b56191a039445a47754400bc2dba2088173ce609cdf3fd07d075c6f67a62ffaf2c1836010c101e96a5bf998b332f8a83847c157a5a118c622a282e1006eec110907f5571dbaa3f582c5977f753f6 (encrypted)
Stealth Address
7001ae8569321bee6ed2ca37cc605a9002b0b4b22976e0998f559c1497a22647
Commitment
8a027074194e6e98bdbe4e70244fe4d45bf21d031e82db8b88eeff7510959703
Range Proof
672 bytes (Bulletproof)
Memo
4f81697d858a47c7711fcbfcaf1768308573ad6b9d89287535807920f0f12173db078ca41af587762323fb3661900996672ec09fc2c02b0a3956874e7ca65b49b1dbe3f10c7f827034aeb6f245f588c29c03db8ebd8d309c70043ce039a05b7d735d283a84e59019d4a51c892549e8ff77abb68ccaaa3cf2e3833c861a5d7750 (encrypted)