# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
36e196891924bcd622a815ba293afb162afbf6addd47e72fcefa92acc94ebc11
Pseudo Output
30bfa75928517b11b6a95f85bb9de16f91752d3b981a4d91c93b2b946aa2af58
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6e7cb14ec4b8a6f5fb660ee532880a5d9c88e424f0e40df25c6ac7d2a1553a23
Commitment
52e9e13c40f889970f594007c2c25c87cd3c316530c5456f069b63e7ebcd4113
Range Proof
672 bytes (Bulletproof)
Memo
f2437e3f0f8c0a9ed3a1dcd142acf9d913352a8a97218af45681ebc211df9138d5fe8f677795d64641c308bbb330aae6ea465cbe11104da062115b161945d0f19edba938c5f1ddcbb36e66f1097e9138ae37ac6e2c3b0ef76184fd8cb0e2b62147947dbccb4e8a6d0274f625437d62f6ac8168aef7ab9552bc487ff7672e770d (encrypted)
Stealth Address
e255e49c5f6e1d31208f150a3f80ea60557de57889d2070a7eb010e97905651d
Commitment
a6bfacad69fede3f34383bacce8ffbae6b2a779a2acc6899808cc8b8c8ed8717
Range Proof
672 bytes (Bulletproof)
Memo
7b7672415db44de9698dc3018ed3db67ad1a63ee3df53a1b9ffcf43d83777652d505cdd3e8517e650fc9cb8b2b27f93a2b04c85e1f0cf8f806a563c435b1028047af1b5d5c8848da4f13a1a723ebc204b676c03decffdc05c11c2ece9d88b62b6a1d8959fb0ba1309256bd2e16aac5e28852ce0604c782ae6871fc1e046f7655 (encrypted)
Stealth Address
8e627ec7b3b612370315e9142a8758b147aa9aa2d71ea2e791c689acfd11df72
Commitment
06d53361d2592b4217f61e9940c213d1c2443bc966222faa7ea2e044e4d31358
Range Proof
672 bytes (Bulletproof)
Memo
f5016a7cf34bf59b9588b81d978e47aa96a1a7607a9f82ca92247f7f75153efbccb0c7849000df141375bcbc8132267310c4078737b6025c2a2bd9513e39d826800e68f42e6d36dc3e52f9bbd8c9fe395f44a622ad1def5b2c447f56fbed38c72d574cdc7c60d64b9f758abfaad5be586d012bdb13979c48ee883a27c8364600 (encrypted)