# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f42e97ccbaa07da9b0f16635214ff368c196071812b3240654b43c0ebece7d01
Pseudo Output
b6d5eec9ccc9d8b3984eb79cdec36d5cd4dfccf799b7766d55d518a2fc0f9c56
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
daee5c47a4f95e3d038616baa5e97cddaeeb630b7dde6c26a65338bb67d4db52
Commitment
286a3adc8da386a1db2d1b77732ebeedb26a7de1ad08c84298c26ace1c8ec24d
Range Proof
672 bytes (Bulletproof)
Memo
bde53e6bb4c509c0a594108bc2bf101d4e61ce0b69e65357acf033cbd084035de524712cbef0e8b601a13aa100f05e939bb4d9cd1a9005e9ebd7ce95a0ee73c481bd4e5614370ce3f66b8702f05f2d50b379eaa0bca70c41cf5c54e5b8563b817f894ba1a420ee5ea61f4295387d49d5b182b9e8821eec5835046c53bf267a1a (encrypted)
Stealth Address
a0da065b882648287addf150fed0b14287c955b0067031b4393406a2b6245003
Commitment
e237f4642ce97d82626941542bed87901d7dedd8f48ed72cf8ce4b7b6050b52a
Range Proof
672 bytes (Bulletproof)
Memo
fa800f0bb9cc06ddfd2bc69a77fd6f4623bfc1a0327f3f51f811c25de1e759bc59dbea1912094a360d40ddf0191b16d076af69e13f47d24718c0ebf8793d68c22baf43f0859ca0ee069a972552dabed1d54e3b6e6d625833704db4136424a806b2320bc45d645b5491f92aceec464a8ce866be5881216784052cf12431fafdc3 (encrypted)
Stealth Address
60f4d1a256abcb26bdf999b90760ba2478a028d21c2ec63f4cf9e14e2d5f663c
Commitment
aca2eb2e1c0a0c0d639e16c7f1b36d0b3132aa6a04e14455ed6d1e35b79bfe6f
Range Proof
672 bytes (Bulletproof)
Memo
95e9300ac20e75c1133427466ae46ee310e9d27cd4f37457aa7e41d0fab3db6c782f265bd310d37831e3ea16e61b4c860f7cfccab91aa656d32423f85990b12e8e4c46880deb08110979dece3547f8409bae5c4e01fd913491605a9d60b9acc64d65ce0b33819fde41429cd343e7d995eba76dcfa14c156139adb2ed927b9a87 (encrypted)