# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a667cb701e9be92b1d286ebcbc767304203a553fb0441072efc9b47aa6f18040
Pseudo Output
60aa7425e46accd2851625e26a9ad6506b2f9bf088ae4ecea0bd767b2f078071
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e0c26284c78d39184cf129e7c2b7434c43a0492ca414197558ba03b9abb8890a
Commitment
183177c911eb1aca16ba08dcc51398c6796e55d6972f33996146b9480d3f4c39
Range Proof
672 bytes (Bulletproof)
Memo
052caf4d3825b8e991f92832fe3f3cd5fff92bcc480bd154eb9c1a104222cdbf990aaf83b424750c6e218925a6e88c031b517c230591800632ccb35103355181bf00fd907c9c97cd20272a96e64445742c3097363c7fd9232b48c1bf29710fc8e36041b7d9044a00ea1368066c5e2c81aa35c3cce61d4e70ca75ef851f28bfe4 (encrypted)
Stealth Address
6ab2f7a582d41adc9dca19a172822dba7513eccfc6a3a822f28df6a82a914938
Commitment
6ce23dedd3bd89d0d946606fdbb2e05f7b77f997d207b6c32b9d38652bb86d65
Range Proof
672 bytes (Bulletproof)
Memo
ff04ce77397af74290a12af14c9c3ecd31c6ba2bdd59e324928a86298f37d9d9e418ca4830fca7ccb665603131b6cf7aacc85042a74674dc9310ee42f8c76095df1eb95740ad9a182410c8cc75fd3488c26c400c8d6d788131beddef41a16e76f00fb124563c3b1b3fe19a4d25f9661681e98aec5cd181244b5e4504c12bf837 (encrypted)
Stealth Address
3a7ae430fd6b243a66a4db95f503915647c99c5787b257b512657e31fb515826
Commitment
2cc5d4da9c09c8dc6b03c05b0d5f0e73d04e5bd6e5be621b12f2482b054ca636
Range Proof
672 bytes (Bulletproof)
Memo
8937cd4aad904a8a113301eb90c11058b0a6428473264ce583eecb4a6528d3590a52f51f4b42f3bdfb9d1f784aa27019a6bd12bfe40c3c2687add140d4371dc08c97f13e8b86503460d346f0808d2fd86b202799e6d8b7a424b32cf5e6bc6ee119ef02fa4ed87b788df7fe5bbd158b1195b3d8dcade7d046c3703b4c61f543dc (encrypted)