# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d6062ee2a100847726afa216845d2ee755d09d34edf3ce037c26fbe5e581a20d
Pseudo Output
1cb78541b2a2f3007a1597435518f2543bddf2bfc7bf72e8971af762ff0ef004
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
74e111e714e6bab43183d57c8493c6704890ee70c46d0a7dda337358ac79e742
Commitment
4c4ffda24d99e2cf18c4e602b85e9319f126fe30ee0de770f856d0ed8c846d05
Range Proof
672 bytes (Bulletproof)
Memo
c51e8b15904d1b1bf8825549cfd046b634a91428426ae829c27fd89f03603480fe3125dcb0a190d8c736867be00f98b09af4b51e0c7a7abbb266ad7ddfa9a2c16778f52f5e3ffbaabdcd88c7f8ac9fa8abef6e17c1cc6f31fe7e079ef750d804f84939fe58ce1e28ef2f450d4bdbe1b5c862bc85323bee381c27d9675fdd59da (encrypted)
Stealth Address
40f486bba6bcd9dd02dc411b2b67ee8f7c763ca91e17be0d2062033966077d32
Commitment
3cf3f9ab0f4fe05d48b84b2969e0d525e7ab260f7c39de54334c25c7ae642f63
Range Proof
672 bytes (Bulletproof)
Memo
5aa2eea32cf508c9fb6241f386c479a418884063f53ef4d01cc5c203880a2d7ff58b52ebf5bd06e699aafa553d577211738b78c64fcdba27971bf5800409c883027d3fbcfd26e2a2b46e252aaa1a56d983fed8b30a56d42497c7d4ecd67c14ebb00b2c25d5efef5802e6d951d7b754daad18710775aff99122ed4bb027ddff81 (encrypted)
Stealth Address
f2a95284c293097853b1ee5c9150bd763dd4632f8f86d7f5bb58b11b4bae8a0d
Commitment
eaf3e6f74c583f09d1b23f6d36d188c14551d04c213e284688cedfa8d872a81f
Range Proof
672 bytes (Bulletproof)
Memo
59c3c9d301923e43183baf485b8a1b2da30b4410f4e79d004f36b90b8fd98caef4f8d2b3e57dbc3ccd0a596aaac81f7a8b227109c777e06c882b260d1637e3fe63ca4b7e8af8a563a6e425e25019bb5bfbcdb65c243d65c3c2448d7622b19e999958f9dd4a6dacc72e5b6e2b246517d3967e7abdc7a721bde8883c8c2b6405e4 (encrypted)