# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
acb3fae357ef80fa16b01124f94c5d236bda732fb44501320ebcbab7679e424a
Pseudo Output
303884d0925592376358221ab61b848902653af0d8aac5854da6dd7810f2567d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5210b029379560ac88eee5ae06331d7bc8d8e3e8750f9df97b66573f4bec702c
Commitment
3ec616b0b3ae26aa0378614ce9c8d589cc3cda29ffacedf487a8ddb03a2e1f6b
Range Proof
672 bytes (Bulletproof)
Memo
937ef77eef81283b0a4869f0c69a428baf9f1dfd7ca9fb09c570105381e012e4addc6da04262a77bfa790b53c6b7449587418cd638e0a0977ce33970bebd42a83759888b4b160f96d9287561c9660410dbf2b1f77daa2bfa2edb3921928cbd9c6e3cb8015c5feeac5d14e36b2ef2da5d51b0496497298bc44c3c10f0ebc11554 (encrypted)
Stealth Address
e454038b3029652dcebe6e121f983617db9033fa7679f51b7ad2b87aaa7ea73e
Commitment
b6ccde48b5e48a3e016ecea595232148c826194833be6f4b86238e769f7c2176
Range Proof
672 bytes (Bulletproof)
Memo
34015f4fc1efe4a25e8e6bb042b98021bcf895c90149e8dad5dbcb954f32e96b23d486c3ed8c1d9d1985587962d6b39996144e393debd54b4479e3b35e453cde4bb67646580400dde04ebd0a7649f106dc4f907a16323104eef70e47a62ee656b41cace31aad31f68afc326e341ffdb9f17260dbbf77c33ea65f6782b0ae1a8b (encrypted)
Stealth Address
0012c8902335814117f256fda3d5331d06f84263197161c94c853ad8eda19a31
Commitment
3890b1c43a277ce02a764d09f9f95d943d73808756fd94b4dd19234eb9632719
Range Proof
672 bytes (Bulletproof)
Memo
189c652f15fa4abb96d70e4ea894356a7eebe728c677bdfff26d8c15806e8c392bad898b78672e0bfbe10dc15ccced9ce4b76956ff3153b65889e7329b85ddb84a5211614a2c0eb263316b2182a60e63590e87bd9e459831f133db47ad269541a68db44e8a9266243febc9eddf6c08527ac9b5ece2c93ff88f43b5e2927209fd (encrypted)