# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ccd299f15921500cfe805d0d8f97e907acbda503d69b016994ef4a46577acd1f
Pseudo Output
caa32a4ac8ca8fcd895e5a86c42e581ca865ae7bbf3589f865dc46a22313ac25
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b44d6f58abf33591ac4e78e0f6ba0a06eca78f8e768fe1086a11ae5a0fbc3e32
Commitment
06fd2ac1337b62a79e5ed8e30d021aaac69bab5dbda84a4b0679222e2642cd2c
Range Proof
672 bytes (Bulletproof)
Memo
5853274cdc173a38e4852e8434f0a0d9e036cf535c26d20b71eee1befe20341ec3bc24d34fa30cacd1922fc4ab3693748c32be015f5168abd0d2c6b2ebcedf84b7338718d971e191413a22fd2289e55c0cfca09f90b3fe07c78dbae06215c826842b18f976f425ac6133ad337e0b4c936069428bff4ad55be98b4c9b80dbe23c (encrypted)
Stealth Address
0a98064a6e7edb6976ad8d04fc329e08a9134d90a9be6a0c37cec2d041a9675e
Commitment
ee5f1c0157775af58b17f3b1139b23f148c03cebfa9aea5becd12559dc45783d
Range Proof
672 bytes (Bulletproof)
Memo
78ba176685b682802153254c135aa794a8d46ec30c62607a1dfd226ef3b28bc22683d45684bbe047617c2cd095bc5db3f391253087d22dc8e931888833934d25c3800d19f0bf3838a4fb3628c11c253cf11ccc3bd4476d3839df2b6802482996fbda65c5ff4f12d674c870a28a7a7755c4021212242b32581e4dee14764026fd (encrypted)
Stealth Address
2e21f74a20b2f8f2a5da2f5dd518d5e362b513de9152fa0b98c075369f7d1957
Commitment
0482bb834ce8c284677f2af482d9a19cc1b48923cd39f5003f7d22c0e2779316
Range Proof
672 bytes (Bulletproof)
Memo
5949150b572654855cac9d756b15ce4c801204a35ccdb20972c25830d3252b8ed43ab28d69b417f3e99bcf05791f813388b619c219a43f16697f11020d3ba62b2b7176da5cf8d4be0a836c6c1f8348ec01ee735a2ee8b63c9b0b38361f2fcb008e596969b4187ef43db0009588aa302373f68d47e7fe0e87acfc736b8eddb47e (encrypted)