# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
12a9bac365f76f9ce4112d6327bfcdad47605e719a20a06ad7c3a3b3c487eb59
Pseudo Output
627076d83f8dc0a8969a0ff3424f0590743c93dcb37d851a7a952839d9c9137b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ec59bf7a7418330ad28bcb0f333218c26acbf1e4c065d5d5c4f9684d38c9e32e
Commitment
fcd72fa3aae732bccc75b21fc9ba8b9e7b4f7919da7ecf3b09019958e0dd8c76
Range Proof
672 bytes (Bulletproof)
Memo
e8720f2bdc5c5071be3eacbdfe57c107b210112e0681ddcb168f49699c9bb794695a09b41d65c91f1dd219bb4efb1347e88b68ca80bf1fec7ad9479b65bb76f88ef3570c8ccbc66d57c9a08066edf53e9a3f1283f3cb59045c79da51c5dd07c311e337ca821c559d0382e5f9d953386164d5b78b478810987369cd22e7c782fd (encrypted)
Stealth Address
0c5867d38380573b85672ca6b214656342e4ed4d38103b1acd1545f289bcac26
Commitment
864ed8e866e2eee6a75bea5edeaa2034bea97b2d05077c08bd3a9c948c22aa76
Range Proof
672 bytes (Bulletproof)
Memo
7073ffa09fed83f80d7317e3ee1d67d08d3d753505a61315f54f05de51b6951e1b760a08f6046d04ed119857a7baf9635cb207fe8fbd127a7a46b6fc85065006a3884c626182535607653a1848053e8af6267d7e956560292aaf321e6287605ab9306bd829b00cfcdab2f2350ffc0b5c9c46f15aa081b2c860eec7da2b2b9146 (encrypted)
Stealth Address
bef8190ad60ac4f9ec2ca8d15f7615b98cca4e36e923024d557255c29e7d411a
Commitment
644d0d69ca12a9c4a12d719c590198871581639155da5843fea01bb36a805d7e
Range Proof
672 bytes (Bulletproof)
Memo
61c37c84fa92912bfa543bf5221b45afdf93c3e649fe9f8299599fe3c04fd106f711639e024c33f60f2f16d6d2b5503b98d8a977e0750ccc79a0f2a7ed00ca555130b21bfc924c65324170cffdbf4a90fd7a36b71ca72b1f518c4365ac07320dfc7ed20325df41bbe879ba43dcc76072e7293c83677f17e45418fc82706873bc (encrypted)