# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e0741ea0d70ad5dbae09e13ebc35928631b878b0e5278bec1ccd72d4c5a2dd7b
Pseudo Output
5e5f0f30364034d0cc3810d002f5dd2c4bf4d341dfe7c3dc699453093ad65f5c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ce073d3f566104cea7465b6c64e2518e290e155071920d69e8f2c71726a00406
Commitment
80f870d53ec168129d065141498601f343ee55b57b4232848544ebe1d6ec320b
Range Proof
672 bytes (Bulletproof)
Memo
9322eec0efe0b1c382379a2fd8a5fb946946b271ff5d9ebdcd853e28df319267819deb17c69652a2b884b73e5f1b8cf7add66f52a1968b2521406bea5d7696f369d78f4353ef1785e2c2faab8be629929c30d0e900600a6227ac9fb687bebe22e66f24e804cf51d18196e6618b0e2e44fb413a10bb2c8b09b66e72a4b49b4c77 (encrypted)
Stealth Address
f4833c186b1714f018582b1d9a0acfae409b25f5d7c21aa3dd0814622e375f32
Commitment
b823f32e0056c23420bdad61c5b397782bea61f6e6276799f377a538c1a75c7c
Range Proof
672 bytes (Bulletproof)
Memo
51b90db165b834a53723fc1dfcbcc40eec9d36e4f220bdea3bc59a34a0f3d4123a838d5b3ed18f566470d88d667d03f04300294b39412d6495745c8c24494ba17f06486a694a59b965d23209d00d084f8f4513b57196e042b44f74637c9b693488c3bc19e33282d2da8bfe9989265ad687235a3f215063252eea988dace8f4f1 (encrypted)
Stealth Address
eed59a66632d188e3d10d8f1f5934892f848a2a18e07037de54d1e9dab24ec66
Commitment
fcb89ed15d2d6ea912061de9f9bb96c823e48c12104e054072366f0c54cf6953
Range Proof
672 bytes (Bulletproof)
Memo
910e009070ca3554e227b403d31a8d078196a0e83fb865b680835eb9d7964794ed0795aba0dd5c893e717e791f58b5313a6a017143c6216aaa2e5ff75d41c20a8a1dd7cccab4a212bcb34ffb76621a97d951db207ec0ce0e3d7863340ba4da7d040b084fc6d5c544f60d203c345df742844708a87f8d444522561946de11539f (encrypted)