# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c67e6e73867f79c6c358cd71bcef09f15632831591e1e88dbf9654b30ea8ea36
Pseudo Output
94e50c8b2a4274340b6aabb1bb749bda857903f15cda48de40e9f2908040c63b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
de7fa33059a4aba3736dfb6162d1210d0d99fd0a2ffde436f2c574733665612e
Commitment
40e5bbe7ec807a0032d5cb671075fb7a8d1426b091b1f50ee2d10c9f32d57431
Range Proof
672 bytes (Bulletproof)
Memo
3c3553cd4363a0b86e8db559c5e4cf5c311089e33fa3343ba6162979062bea8da6055401fc832793eaaa776af678bd5823a00fe70dce580eba9204d710fb58e2f1d2d2167020d21a7aaa05ff05de01329d6f56f841e68ee6172bc318c7fd12558c38e3191babf155531c4c46449a880b74a2a06f4eba5406ffb27d6defa10f7e (encrypted)
Stealth Address
3430b504081b8087f6e27319946da2f32ff25f835a5a60dfa3f79170573f4270
Commitment
24190d53f76c61bb268b4f0e676fcddb8c31f51f7b5b4eb0398901eb9818f60d
Range Proof
672 bytes (Bulletproof)
Memo
a5fd354a260ff1519be5c2fa0d5c553936d1919e1b8ea3125286eced9e38baa5f35d0d82992712ec47250da5bfebfb17bc8717eaeb3331da4ae6e98dba8eeea3f6a482f7213672a1c26bae573d778d71ea9b203848094cacca878994af734fc7c354be2ec4d58e1aa3bfbdf35eaa751a5c857a4181ce7baadf89a9e24b550e57 (encrypted)
Stealth Address
c0f5db88a0743b30e7730786f66024a822001d5441eae1740283bd5696211607
Commitment
bc7ddc6992fb1316d21718fc4c30241961ffde4dc7af837adbc6272f78938a3a
Range Proof
672 bytes (Bulletproof)
Memo
b10aa70cc249c8cf8bdf9ede0f4430561ef570375684e4fc234e66f4086a4f3c050166d55e1c89e37327c0834a0fe105ca5aac629a8fd0be0841fc72350f2ffcc3c1a1a6a33d77667d02cf800fa1c79dcc912ab65ef8e3889055264cd3b48e7fad46364a8584fd36c94a96a11c80edf390d72e23326673746a9ddb84cb166f9e (encrypted)