# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b2d9d7ae441f492ae5455b1c8f26b002ec31ad3002ee9e057b636895111e9904
Pseudo Output
d4835aa9554d033f180bf5b1ade1c9372484856b920ae64a3fe40d766a90ec5c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
141b66397c49e78556f021bde258aeaa807cad647f6f997cf47e3ac96652d079
Commitment
048bdd2e1b166b0346ec2d3d5f34f2ba78b46fb2052f3dd4b7144a0e27f71900
Range Proof
672 bytes (Bulletproof)
Memo
b91ddf6e58b14ffd72229b5e502b411bdd7a5c6c24e94f9ac8abfdbf4f8b58b11459c75a71f490cee3253082551c576875d6c80dc38db23e85d942328d6292ad9526b134b04337f87bc1dae626d0c7414bbb18eb88044994ae338e26f83668a9e9b7e22f26e85b6eea3d7dfdc9cf6516d85d34e2ccd8d98256070b5dfe368255 (encrypted)
Stealth Address
922082a8b32a43e2286b39d4ca597fd1cd2b068a0032a96e0ad9960e0690c50b
Commitment
200bdbd4a1d58ef4cbc6b289ab757c9b9c73f340c922e845c1bfd89b2596ba7b
Range Proof
672 bytes (Bulletproof)
Memo
2f4f37581fd7dbf3be98fa986b73772c00b5758c0e6d0346dc996cffbb2ec94c2e55e49a4b54e9b89ac543b94038c8705b9c5646e9195bebdc1b15fa3e58cfa60b74c56a0fd7a7e9e078640bb1adbc64e821cfc1ec6f21911f7cb9b8fbfda432f4b0ebe2676ea4157fe7522c769ca9108fdb7d2ff934799dfbc002915efa9dad (encrypted)
Stealth Address
c4c06d329e54295d72f678f76fb0454aa36939a5fe99cb18ec11b9667e15175b
Commitment
a2896bf77b1a447fefe64f3a5602b7057e24ddbdb04536bb65ce8fa807bfc841
Range Proof
672 bytes (Bulletproof)
Memo
e3fa9b8ca44802fbc9590ee4793f46061acc2efd24bff2f106904e38afdc10a373a3f6bbc76618faf981d97eda1f7fab204863bedb51cad07b6f660ca9da765d2b2ba3dcdd015cde4cd0cc1792cc0c1b3ed8592c0c1e72ecbfc26d5f01b358765736e1cb226bf38c7cd6e3052151aaa7aef45c6a19d64b33240f631261e29d28 (encrypted)