# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5e85cdafd9b7b59eeaf36039b39be3305bf909630d8de8a119894d414623a654
Pseudo Output
c64751d8711ff6644f3100a780090b43ebbedd9d2300bbb15f215f232d4df076
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
be9109d6c114ddc9827abb9b7a84295ace6aa6e0e034fbf2c3b293a749820065
Commitment
c81b334d3da6c8a1497608a551097693f513fbb0663cd5e3a6de8b86bb1c0641
Range Proof
672 bytes (Bulletproof)
Memo
b2e8368ff9b1f2860524a20219bd66c4aa9b19b62f90d3129872aa24a5fb193dc43b2c324ac4795f6811c76f2b60db99500abbe0237d074d62e682d55604acc56797c27ca67a7535ab4a081fd126db0bd186eb67456a7504ed62ed63ad090b740de1d65844f788aada8fee1d523fe87a8b9e2cf86c782e697d008a97e82a4d76 (encrypted)
Stealth Address
928b603dfb7f0877939d17f8d9933aa59f3d603918786dd7742bc74db16f5276
Commitment
ae28f8f8504467c312e8de9de67a47a64fbf0189d3c7da9c507ba398cecf4453
Range Proof
672 bytes (Bulletproof)
Memo
13cac1650e1c4b50d2d27244d3c629cc82bcda78af6e90828c92d850f4e7a718608f6a283f22fa05ff637cdb68c4910ca7af6f3c091c441748fadd9943aa445b135491b9ed814a39c565d403f7d91d770c40c5924864de5fc60bf6aa715e9df9f3e73b42d51c50504ba8a647a7e833f4c1ee800d9e31fdae4abcba33bdd996a9 (encrypted)
Stealth Address
ee60bb594e4ce1a08e574b21c533cdd765aa9c1bbf28bc9879572ea8f5fa083c
Commitment
dc70a8ef6849e7b52bb165dcd1b7481987513a5e62a036f7f135020044eb0d4f
Range Proof
672 bytes (Bulletproof)
Memo
f5f85371b4fe39c02618fc92fbe1866e42cce812624b487e0f9b09251a7487061ed1f7bd4a698695f97eb133e9a19ac09cdae8411e1b288c6c7333445b72bc099df7ca30ee082e172798416349e819f339cfe76774dc36894f62a62ffbe487d7b92c974a144ea4a8e5677476bd6c3e125904dc6fe396c2fef7d361072778f609 (encrypted)