# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a06b924943c92fae1fed49eab75e5b65762f6aa3cdd9d19bae90358892c8f47a
Pseudo Output
dafe12935954c5feae4f18246bdad0d11d9fc4d86b86c68fb6110fb10eb7df50
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5227240d7f1291f3809301f1028fcac4abbc5691f7eba02827f4c94c60284224
Commitment
1003ae391b5ef879e858b1e556910af5f1a55030e0be534bc220ea09c043416f
Range Proof
672 bytes (Bulletproof)
Memo
ba2e962d76245fff3a9a0d84e038bcd9edb2b7e9b2380464221a86dc5fa9be4ceebc082c2ff36bf63c9634060b6bb3637b05be8c902705e77ce01c2c3bba5c84ff4b5fc6cccd31168c64c5767a7d3162233aca444637f94bb5f93b22e6b6bc4fcd004c39e3d1d5fddb20f84816cb0802e0845dd983f5dadb32e44ef756c9cd2f (encrypted)
Stealth Address
42690da255d2b3a35a5f40340b684448ca24ca4109a854fdf7d089e7fb0e2166
Commitment
b81ca53f398274d6dc4900cad30bb8e4478caed3ac37be2088bb3aa4b86dd57b
Range Proof
672 bytes (Bulletproof)
Memo
1eb00c86a171975a6894322d7ad93d8401a63f3df3a2f27dbbca7a199f0ede6e77f2ee6cdbf534e78417259b38eeabc33db24facce4715834be0290cd36c301fe593717186cbb544b7bc71e70aabd5fb9aedec95fc1c360cb9bf6c1002f086cd8fe973e6edae9ba83b6783279313ea5bc17c2f49afce5747c20e02a57c87a2e6 (encrypted)
Stealth Address
82abd2a5147d915cecae534cd5b6d3a8b749c2d689dc50763d56aed6f87e4930
Commitment
1c1080aa016c489b95f56da5ee3bfb28a24713d5beefcefc8e6336c31f22351b
Range Proof
672 bytes (Bulletproof)
Memo
667321425e9d5b202e6c14492c734b898bfc265881fb7f0b2474eb133da27f2280695eeba86229cefab234e416236a72e09f68140d58309f1a7bd4d861ffe18134b5d7c75c40c757dd0d142d8c5e863555c2a8087f9db4add576db4061c4f8dd9b59f0f4db03d9d6cb5bf9191ade278054ae8403ee1f3ceb8886f05d74f111bd (encrypted)