# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3c5d1adae35a07659b7a6c266dcc2178cce246d4503a5675cfea5dfe232f3160
Pseudo Output
a85aab4d2f427245e0604c04061e85a9bb54c942a753d0e064c8e4fe5fc64a48
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e6daa7149a53b6db4ee7056630bcc4f01ca6003e9c0a47cb0589d60f596bca3a
Commitment
2420e40daa54f436217ee9eb111beeb3d5418d5af92421bfaf58d6b05ed93b15
Range Proof
672 bytes (Bulletproof)
Memo
ff5edb884ec28a287cb9d9c2d34bcc727849045e4250a7ff58b5bc2d53c442f7d1bd371498a5ed7251a21472eb35076d0c85e4fd40384cee47440767f7f451b7b2b4c403c07b09b04fa737c5f60f83186b534dba3240daf4ef8cf95d0868553c83120215de112f376f8ca602aa01b281d84d5946936c535ed32f4baf23964c81 (encrypted)
Stealth Address
163994ced192d55c4f9ba8b67c4efa4936fb09ea5f30808021e7185079898f1a
Commitment
260afe97d811dbcfcf922d6e0a42ae8015d4d47cba9be849d54e71e10aca1329
Range Proof
672 bytes (Bulletproof)
Memo
55649c7f3730236846411c13b33d84916ccc3d5dc06f5296f7c73d906623355af41da8ceb25a7d8da0136610978c42eebd3e7fde6a38e0f6a4cfc4df18461c927b9bf916a68f961e4e565c5de95d214667794055dc8bd8d283a2d45180525cf60b460383a48ba2e019842d4950524d73a356d4adcb2ff2333681bf7a409f1172 (encrypted)
Stealth Address
c8f3b2ffb3ece451dc7dc247b4f6a7caa435c29470e20529b079e88f922b3330
Commitment
085b6d1db51e84132ced0d9c9527dde1a883ce4a6dd0d609d55706a1dc410a5d
Range Proof
672 bytes (Bulletproof)
Memo
1b4f506c8116f09798383a5b1e6f49e79cd6f280cd1a07cf5ccca8803e98c53285cd4dd3b637a1abfc22ea8ff973bf793d9a2e90a66165b9237416625228e930eaae52645008a3567ec74790b9aeef27d78fd655097eeeec1f361ceeebcdd6d73e4c9a46c325e6c98560a73644a301574c659f29d7e6ad0d5fd69e7822ac82de (encrypted)