# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
10dbe25e6485143322a2583c7b44dd9c41410d208bc57740893f985f19790066
Pseudo Output
3ebcdcb1610a45735506a932fa12e096321d3ecaeb1b46d0d25f61525964cd49
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8e1043e095e65ab4d0458541a1202d27af05a6633aaa7380c8f3ff4f25f7684e
Commitment
c454e703550070e7fa8be98024edcc38eca4505106579f77568f59b06a1e2444
Range Proof
672 bytes (Bulletproof)
Memo
c5c5f51a0d123d091a632537195457ea6c995e37b59bcf37b4fb93cf377f8e8cdfa84a287e93b2aa5e190151b6896eb4cc3c6a64c5831b4eae9a9e65249e1c064f47369d86fff57e87354fa56d54d8bf96cbecff903ef2d41257e3ba000269719b003dcd5925ec80c17100fcee27760f057a29fc1d7297aaaac20f19b7173393 (encrypted)
Stealth Address
6ea8058f40a098e6034050ae04c871ba140d86b53d9f43fd98416b8c93f04d2f
Commitment
7057a4de957e672e719010594773fbffeae69ce8b6604dbb90d2e737fa430c6a
Range Proof
672 bytes (Bulletproof)
Memo
99ba415fcd14ffea1417f5e2283366c6046f6eb632b8ac6ec05e0645f5c2149612951238932d0886a4807c1d8fc2c874c3e02e7b80e6fce3fc98fb59a6bdc3776dd3294aeecda06e5a6653ee4db74bf98b314b29db008ce70c904c967d0f27ef63a00186acd05d61a0d23e9aa6538e3d00217edae4d02b36cb5f38f6bed1d922 (encrypted)
Stealth Address
62b9cdb4d6a68e1efcc06b9bab28a9cbcc49061053ca18efb6bdbbcac3a63206
Commitment
d2aa98a1573438baad50ddd43945eb2b85ea7310eb5c7f860a64db207b433929
Range Proof
672 bytes (Bulletproof)
Memo
f2cd8c6d4b6130ba2680d733a3955f6a0ab1d720dcc5f70cb35b18a17199bdf9bccf9db840174bf54eb5d55467e50960eaed688c6a148b5ca3846c083bc64df44dc5fb4a458bccb99d019fca9d6a8b59b86de1970610f05025c7e0c58702f71e03b5c95604a0fe0547a2c578fd662185f4962e50c17dd87c75a6092514a93217 (encrypted)