# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
74327de24d0ee8cb51e70431e6f79befbcf64f4a9b45451ef197394db3dfe13f
Pseudo Output
8294f7f16322b85380d173cb3ace5f7503d545e05d5c798853dfdae1cf2f015d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e889b0c17543ab92a3941dc8f7145eebc468fb0fb488fcde458d606786db583f
Commitment
2e44907a0a795dc424e5a245ae0c2dfd5ed585a0588c846f16bc3b8de08f3540
Range Proof
672 bytes (Bulletproof)
Memo
7ab2256c43670bda45e940feadcdc353552b29f37bf68c31d4ec47841c2a4bb215dc9e4dad4eb524ea0d4cafcc35a64f9496dbd1e329a7135ac3a72b3516ca5e8cf1cfb8c05dcabb83b14d4d0f6253a80cd0e91b9053bf9f66f8f4edd3e6c8fd9402eb027cd5a99c7a5d891bc9d47ed1c92ed5814776f66882a51fe621366c97 (encrypted)
Stealth Address
34b78ec7a62520ed6d5eef096861ff69474ead5fa1ac99d517deca12b44f6a1a
Commitment
e02b0657c78cb4164f902e054044eb886db9d8480f3dd5ea554d347bde2eaa26
Range Proof
672 bytes (Bulletproof)
Memo
cccfd3cc545bc7edb7efb7d0d0dab4ecb1a37080baffff47d33ce84615b9b734852c4b10b98547d39ea1e9b11718dd996fb5f662fa454308840d21be27558a24107ca4ddecb5c275668ede83ad38b20c6e90b3f56613aa9590a4d3b9c388f823c4083e69643b65ce58dd90a2a2fccf41991f67df3665d84459722fe0406782ac (encrypted)
Stealth Address
fe388be4219cefc1c4471e57423c435e0706f7ae2c68edd5c039702ba3657914
Commitment
0c6bb0d21e7b047b8a85fbce35e4b7ebaa597f38a82096840c3403641aa17619
Range Proof
672 bytes (Bulletproof)
Memo
3694f530d3c05225d04ea900b494479d6c2a7f1323c1b531b59b6d0221524d79e8b6b8de417c55748fcff1957a61d0f5b3310e5b320a10381201baf54fc5dd661146bdced10c698761f0223fcc4ec6b4d29c1542394498715a5c2d0bcfc7413f2b17c595d835f403619c789cebf9913a81ae91786706a33cc99ae10c830211cf (encrypted)