# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
24695191e010569559d8a5516caf9580a7ebbc214606672eca49870c8c383e02
Pseudo Output
94c18ea8ac5f3f5721bb624d5016efadc8bb6e4a80a33e96cbeb634899378000
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f4c060d4670687e642fdcb326c4a9ce92c15846efaf4cb2e7b3da2b68fe7d112
Commitment
e41ce03b99a98406379098457651cc971e710aaa69ab056da1e60aa6b8122f71
Range Proof
672 bytes (Bulletproof)
Memo
c420fc29c331b333b298e481d1c30b591d519cc677e08756a7601071db9b3272d8294c3ea4f345f5810b4ef26d138163372ba0c423b9c1bc2fdb98cdd1fb0936f47944c6e69c0a2bc91e980223af4f6ef1d96b1b82a31a0ba471a7c917ba6d92b028c7aaada90e815c0b34b2e095570b9b6dd3eb67e8994ad2cd4787de93f71f (encrypted)
Stealth Address
10b4ab75bbc87f000bc0c22308dadaa850e4f922f51e700bda84939230743856
Commitment
50ab48b2099b6b475cd28aeba198fe64c7ac49430eaa5ebed57235123aa04626
Range Proof
672 bytes (Bulletproof)
Memo
bac3615f294a621f2e862d74e63b33ee71a955183db4ff1b02480112c13e8631021f371cf39aa84532f3bcffbb481ee77a792fb012ae2dd02e42c679fc37f9020dccce79539af40ceac22d1977fe142b3e0dee885158a955a5e3187255b88d6cd3b4351d5fc887c90eb4d1cbfdcdb800ec9386e5e4b5ed72414a5d9394a68f26 (encrypted)
Stealth Address
e4f189af2963f0b7c27e8930228be479cb65f6d4d61710f4b45b8a52320aaf7f
Commitment
0e853f687064b316f12a7f4afa8e9aaa66c3d14c434a01586b4908ae1d2fbb1b
Range Proof
672 bytes (Bulletproof)
Memo
2f260839cc351166041d63182c43d70cfaeb14958e82b2f0ca602bcc11181836903e559bfe2b6762fb23b8458e4471ba7a0ab0f63196ca6d93e508c6a28d0db966a239c1665d761a35e4a0f36f9068ea7e4eabdaed23dbee2c33ecaab6da1aebc27917521c2f1376a07e613c5b207b00c88fea6f2d02599d64585ec5161367fd (encrypted)