# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
449218073b8390900f177830e0da1445e632c678f94e93df97e0e830902a5443
Pseudo Output
0a02fa52b5c635e50cc65e7f7d599db64b697dd2eba9519059ad2892bbe61f7e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
10a76c07e3f6130359aa55a76d4e7f250fa97bb2bb3f70898b22f4f006e8ff5a
Commitment
3493c47b41b68d252a52771dadc3906a419e1dec0f94824c62ca90571213d05d
Range Proof
672 bytes (Bulletproof)
Memo
546378c39a3c632bd4f0fcfb49eda3eb5f631c3f5147be15e8b410c5301a8f0736913c09be0a843b855ae8e8e930f32871017a365c249bb3e7f1e8ca2a1f084029e2bdfcb53eeff957dbecc2a6cb79ade2ee191d16b477cb0d96e6932e50f97f3d71423e4100dedfbf8fddd43c0977002cb007983fc67c5a2d9547571ff33bcb (encrypted)
Stealth Address
749fb6335256904319e548a9332fbbe0e05ed4d09200e78b52edc351b3f8fd74
Commitment
dab6895f2c6bc5444eaeb34754f55f8537c3b03f3e5f0d71242fc60a9637ea3e
Range Proof
672 bytes (Bulletproof)
Memo
5ad4c5fcb4e2e7aee6c5fd8dbb1719dd96079b8823ca689823454aff7b04eb430ca416c37e15d8747779ffc3c74edfecf3f129d9f31dafd2e94ccc7a06b25a4fe606d3b27709d86c57d17e30c4111ef6efba79b60afda91a94e4a3719baf67230ffd74394bab2a7b0416e415fcba6efb2e8974fae97bf6e42f916dacece9b127 (encrypted)
Stealth Address
a4382c395f31793b5295edbf4fd5c5730300159b9db38cc493c0c600f656da7e
Commitment
4a5eccecf54f465f2bea935919bab3f58396955c0dea9001f36ded605ef4a30f
Range Proof
672 bytes (Bulletproof)
Memo
6cbdabf1220db8dd74d1a1873565c0ddc4781ab008b070a91a80b9b61bff95d2b52d5be40b3896409e885c6d6be011feaa6354d96df23adf397082e08a426c794ed764b2077a743c45855c00fa659331c1d67ba0bfdc692061662a920d4ed86b2659e55c889483492661969d70115073bb419b271763189692622c88aacf31e6 (encrypted)