# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4007721dc98d1d1b79a9443032c40a514c287eeaeec8bc71999493122dfebf3e
Pseudo Output
80a849a2e1e59747ae14be48ac230dca01a91412868798f6840aece4d329ee4c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
88b6113f973d69e7894c25ed1a508d00b99eafce17be4997e451bcf38405900a
Commitment
d84ebb20e03dd770c6051c4233374d61f1d4e67551ac2890d71780004f3e8664
Range Proof
672 bytes (Bulletproof)
Memo
b926002366e2dc6ad66ba355e5147d155e57a18e901e0f20657a85bbdc9aefa97710b5489410475c9d8132edc8dd1e06e13ed4e9ef3126338f3f64c0db82031c1e58c49cda81c17e2ad0422648bf0ef9beda8a32163acccbf430d7d5780473454d523a001d30da920d1d4f8d50ae450648ca0e98aa83420481e23c08b05a6423 (encrypted)
Stealth Address
3c9fd9041cdd99210c3f64cdc4cb117895383bb233e0789c8f74dc73216a174f
Commitment
d29fd3494643a8cb1e0111a0462255b8d062f5b4181679b58af07617534e466b
Range Proof
672 bytes (Bulletproof)
Memo
f1998e09e71c39180d88f6ca50aa89c6b93c537e1b719e5d239ede54d0d8522bd4cd4978e9913153014f7ab659accb35dda2fa3cf815b03e75a9482ec1ab71a4bd0bca87c3371bec35a0f74dcd570944f114db26ad62fc47e7978010f7a13bd26ef902a8dcf43b7c412f4fece6ccc3f561e32141a9bd543ca7046da27c84826b (encrypted)
Stealth Address
0eee1ca9445a3d0a30a3c1be5c4877304d4c470b4fbed81aa58bb8be1ffa197a
Commitment
98ba82e8401cd6246f1ad2aee68e963da2dc39201f8655207322d1e37ad79f68
Range Proof
672 bytes (Bulletproof)
Memo
58a170b2501a2aeb085b5033cbfac158f7a2b27efafc1075bbae417a3e0cfb8fc0585d69335b8670f4c0e9d765c2ac937235d6106be4de9d8610bf5e9a125ac220c81e05d6673273dd1796e0c6868f5f3e65b5e69a44490d67fc64bb1708a153eaeaa5ede2bceab8337319dcd002d1096a3fc58443d740ee292dcea23a650152 (encrypted)