# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e2842808c4f69971af96f2ddfb2910c0906becc3b71d63e6219cdc2d2013b102
Pseudo Output
2aea4d9c133c0adb313e9d208a8d85200729c243fccb94da2951651790e54a38
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9cc09359774ddc55a9b1b96728bc0e45935b1afb90169db5cb3236f6cb52cd06
Commitment
3a3ad2366dec7136fb94f70795b26ae4e7650e3d96fdf7378b0391c482898f34
Range Proof
672 bytes (Bulletproof)
Memo
882855bdde655301ebe83394ef225532d840785a2348f13d1636ebd7454276516385f29b79613db2d865d65ef619b8836ebb7222cb9ea181d27e3fd7b0886f79ed1bc9e0368e581462e6f7c86f8ab9b7e6410bbcffccc06a7cd3a0283046bb81f6d065085c965c6d77647a27b82feff7667aedfbd456bfa7b36ca668d54e0ad2 (encrypted)
Stealth Address
44825adb20eb8f186032d5db3dc50e554f46391ed7fe64f65f13d93e66206e35
Commitment
3a0833d29bd719286d509f42ab8a5361adac6b9814f1700575b55b8a2310e937
Range Proof
672 bytes (Bulletproof)
Memo
6f98758be9e1b8f3d0ca63b9af7d81c98386216de43aaa88a97bd520ca0e7983c2af40145b06be9ca78b3bbb7abf877807b3c2fda6d2b3ed3d5180de7898d6f7361bf5fc114ffe2f2a49c6e8c5e38f9d9b07cc2c67edfa42bd82163b152588434d0701cbc94b63b67b18dc754a7ea4402765c4cc920747c6f775e8783891bc2b (encrypted)
Stealth Address
76b75c6964870ba91fc9974a643a6a26613fcb20cb6b0a106db14fd38fb13802
Commitment
9e76786cc44132a70fb3ee1cfcc513e84d39b31dc8344892a72b2481dc75633b
Range Proof
672 bytes (Bulletproof)
Memo
a5e9fb80e96db3dadcf0d8d0b801c7505d154e7c7dd202dc6597213c88bf590d422c8d17ed1f8cba1c2d52310616b1a7acf3d9f2539ced3e1aa61c625b33ca2e643f3cb1dfc544c012f322042c7dfd339ddac9bd88e860dd989bdb2cdd4d03bc1e83d6c7e058e016e7dc8766cd159b9cc76f9bc9994833c9c21d4342efc48958 (encrypted)