# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
10ca20905046758fd819de7c6b248a5d0cb679660d4f10e1212b5e0818e3286a
Pseudo Output
e8b9522c4fc5028a2a70c1445fc3eba7f598ea3bc7ac1ad7058c57f69310672c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0e21fcbd3c572568233012f172186e64d50ef9888585abb60a67f9d1f299562b
Commitment
1cedb8353528127914f4018dae814fed23fa12482204ed6dd580775cad7db51a
Range Proof
672 bytes (Bulletproof)
Memo
7033b9e30715976b1b387acd659b6f86c3cf782a4ef9c38f77d599c8b39e4bb3169ab3b97f81502d97a7e5270d9800ede05c09963c58c74a51070cb89f0a19799e484b8f029869f38f6fc8e8fdf395ec58e74fa466b90677e332dae192c6fefcb94b969320a86281709fec6036e99833658eab7ced22c9e59178404c60c58ed1 (encrypted)
Stealth Address
5c3821dce3b2e1a30374bf1bc79c4b2b00e21e4ef9c9868b2605734d2c472b69
Commitment
6814659751628aab83468d7d8daf22c3697ef5188052eb87785fca9e1c02c959
Range Proof
672 bytes (Bulletproof)
Memo
5f32386f92fcade8e47e0a81da604ab2eb478b56ac8b0ef35e0133e841a6c7aa46e1afd4c40a0371e5fbdda117fa81f7a046884da3bcc9a6cc407253b3bec7781614d2d0f47ba61ace500a44175ab3c3037b092fb9a3eb92d14d06388a76581ecde2cbee1a6a7da1ec308b7171f231bb3bb5c1df4478ac549648af612f425b16 (encrypted)
Stealth Address
028be804ab372d89919d3616fb430d96197863e935afbefc9a29e4554eb54f07
Commitment
fc4f299e0ecdbf171ec6c3fbfaa4502b138aabed50340eb628762a2ed0c56006
Range Proof
672 bytes (Bulletproof)
Memo
d62c62bafebeba19b9230fe7a27619cd7be051c96b8be2be8f374c1eba6be661a5ef7330a44e9bb271fb6aa2495fcce7fe059e3eaf2bfb04085fdbed35c0c793f0a6a2746f8258a8f40afe9dc995f4f592afe5b787cbb4dfa814b473b77b9678d9584d7a0024b01928cf7e6fc43c07668fb90658ec82839303593f63ca768da1 (encrypted)