# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ee19fb0df0464ba900c7a9c4adb927de9a4ad5f475c47dc6a1338d1ac561d929
Pseudo Output
bc9fd8c305ba39f307b980ccb0fa07d94a656a20768e2471bda5045ddece384c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
72de9e8c61547f9814c2ad3a64fba03aa9e51cbdcf8ce2347e76dcea8f1fa00e
Commitment
4ed80834ebdf4dc29c19916894ec9c876ae016bae3a5c3b2007821aba01bad05
Range Proof
672 bytes (Bulletproof)
Memo
d8a4f52a15f4c3159dc5e90e30325dbf8cfc4eecab624bcf13ceb15ac5eb0d6fba5c55ea0c8e2ab05c9ab6e8c4ef77a80c010a8d537293b779bdb296f0f210336e530448893ddbe9e357772f1452ef9d6c4268b07a0623dd1ff9a92e620c05e894c0b9899c70f19044f06e2539be689ce3c9da0154de360f45e05509a72eb86e (encrypted)
Stealth Address
1a6a02dcbdb54cc14287914e00958014481bd3d90219f9a4a957972e6aab0506
Commitment
6a1c144d51b51b92842caaa378b434ef19eb6789f88eeeaff2440a6ea7c5de3e
Range Proof
672 bytes (Bulletproof)
Memo
891e00f2dc94fea06050cb3ea2ef089625cb825399f7129e3f4dca3f1e4aca6e608087eb5fe826324caacecd62f64945369ee63635a5141b779b3ad5b59b6270e94b0c115ebfa4df7f4564a4251757ed77b22316f08f5bafabf4b127a0e079e58276f8d84987bb6f7760888e183fa86308065c764fd7bdc30280c46ac2288fdf (encrypted)
Stealth Address
8031257b8484accb2323e7fdd6556c592072842203337e4c99975b21dab48c70
Commitment
205d5d9b0129e80d11f143382604749f7fae8acf88e216509e3e986ce22d3975
Range Proof
672 bytes (Bulletproof)
Memo
8de4bee0b3d73494b5ccaad3882529249aa5172bbbdffdabe0341d41c3ffd050b9f5865c4d725fa349ea8e6cdd1c303291b64aa86d25e020ffc31b27c7bf7a66b73afa76a7259c043cb4cf99e55a4b969080042a80135940ba9fea3df04e469aca75f6ba0cc4acb01af7e40458135e841a69b6d3b72cfd061b0730398321d514 (encrypted)