# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d4ce73d63aa595e1045180b3f5bef450050622e19b82d6c62c4125e394787603
Pseudo Output
0e58bb3ab52f4474d8205998e20e0bc58569835aaaaaae4566300ca91aac7701
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
347694e43c3c97b5a7663a4849724dbe1b9eef0cc1a43fd6e1f1caa202d9f45f
Commitment
6ebc0e77b138a0f05ef42e67c85b89943879c5beefdf4b01a99240d9b0eb0510
Range Proof
672 bytes (Bulletproof)
Memo
816915c33addf0a0ca8ea42c2e3ecfca5bd57732add7f1478dc5cf6cd62be04ab4b6ef3a871608408c32ea0eacf9a24ea102aa0d3daa4f9201bf275a8b7b6d58766a8ed1c5ed98ac5cadbea913b12ec482711e50d57c325ff721dbfe28639879575718c99faf12ba1c4567fef13e969f5b73bfd01c05f3ad837c273d23cc4bd1 (encrypted)
Stealth Address
8e8398621a7378b72cec48e78551c9864f687d005f57d6e62c55936095f2255e
Commitment
9ae4b390d9df8fd42891d1554e3c34ebbcf42199360e2aa0478926e88ddc4e4b
Range Proof
672 bytes (Bulletproof)
Memo
6253e86913906350a0af2c6298b374f137019ab93248aa9658ff56688c8c3ac1e702fa2df8549804c98891bdb2f3f01ee592e0f02c8fa5395f3815fecee8715f1578b7a6efe8fd4a8a14b2ef0b159a0807d66ec651d2c056207596af5946385044743c7ed36c6bcf62453e8180de7104f246faa37fc2acf952c44a39e5a8343b (encrypted)
Stealth Address
a495df1255eed89117f493edbf6baa93985d3768538895578c1667285dd2972d
Commitment
4a83b7b53156ecdfa55cecdcdd7b84835e848c07dc3bb6eba48db17f20407e27
Range Proof
672 bytes (Bulletproof)
Memo
6616712619ababcc16815e66e9b4c80c0014f9deb5cb1b8df15d2b5d352c34ecf86f0d3de38a60e48b9900b2324609177defe0aab3f14e234ee7a3e8f01dd23b8514b72e46809b62462ba55eedcd0d9b32cff8f7cb69391d3812e0dbf4ff27890c0becba69b3d807f2e4c490d819a3daaf5315623876052c896744ccd43a27bc (encrypted)