# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
12494f6d534bae6c71e54d9652402dea7270a5ced46f15b7a96c031764e4ac1b
Pseudo Output
8c1b270e4163c8ad530339db7d1b437a0c76860625d185865b80a59e7885070a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b0425ee8e86d09934ab7bb199c73c7c54622ef11f810e2aa8c0f93609385d730
Commitment
3cb2e839ec13a7cc0c9235d3b6f83cc0fb0778daf672d5a5c08daf0c540e6f6e
Range Proof
672 bytes (Bulletproof)
Memo
a2153b999155643a1746ec36ed110f5645ecd3a6bac6be3f6b73c419bfe963975dce7b8df897cd1f674d1ea44ebd42e5421db96b559fde2a9f3702a9c42c7f2f56d5e086f5cd2614d4691bf72fdd8f16d9dfb1e89d9f9d5b1e7502b641370e4d455fe68530a694ed194d163fe8f4af1e25cf37345901e6331b5398c6492c4de6 (encrypted)
Stealth Address
1ef92394ba4e771470fc590c60e249215ca7c891cbe7a92833568dc117e40958
Commitment
5cd2c459576c1972749a728b062535d7cb8f5c7796a02236fe5ef8eb553fcc0e
Range Proof
672 bytes (Bulletproof)
Memo
0f9bb3e4e991a5ff5edc7925351b43f0b5827dbe0b295d5fbf962812929b48e5e29c89349d3bc978665332f59b9c7b17d8a9ee53874130971567f47798b256b3272b4810ccf3c4de6f6c8957d929ce959e0c61d436608514b9b27cabf999cea2f29c789ec312609aa5719695909b3b202bac8a3b51d1e2560227ae3fc8ec00a6 (encrypted)
Stealth Address
d01f643867cf184a31f5871b1bef6c63bc8e88f69707bc149b7ea0f675dcad49
Commitment
14f2026fa8fe8298a23f64fed6b37aa39d373c21568ab64f9b6f2c419257a732
Range Proof
672 bytes (Bulletproof)
Memo
91742c24a27e97e5776a4c8c49bb401a65887d6c90ad1062690c1c5eabe2c36128a66a079d6b5fee2bd5dec28e922102554a3f5d36282bc10792f06db82bedfa8488647ea41ca8ae7aa02515ff3b889f57ee3515b15468bb6513aeeac9bfc8f3d2036f5130b3104a823b1187dc66ae5b016f96f74cd31feb4eefc2f3ee75270b (encrypted)