# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7e0d528a4d0f5749df0b8c4d089976251b7f4306070b1624a3219b978c35803a
Pseudo Output
30390d07a136105b5e629effe32e41ffd58089d55917a4d1dbf839ccca14751c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2c344a2196edb7b936518c5ef73c494cf014af91da344232bab9cb74e2ca7c39
Commitment
6cde6d30ecd055fd154febd71f37b0af11ce3234948b0528d347fa281b5de41b
Range Proof
672 bytes (Bulletproof)
Memo
02bfd1cc432cbe2622561a81770fdfb4e23a0b906863597d3c284089591ea38248608ed3270e27c308db1e643c53e8cd5b294f2000cc2c0364ea6896faf9b0b65cecbda033dc4098d24707335239af826a6cab9ae3befdb6b094e4c993855d32fc801af0b486ce1e467245b8b8e54d375c96b32705a88a66f24a0236c1937c17 (encrypted)
Stealth Address
a4e692c8d4464402786dd390b4aef4a2585d16593b11684a9ae17b460e5dba64
Commitment
6266ce7bee8199908b6e0ed12c27c6707ac865686c83ab6a9146603a0395d926
Range Proof
672 bytes (Bulletproof)
Memo
88c5fb328cef8278912358bfd64b15f75787169ae22bfcb6257b93f7cd1b1297cd7ccb3e275c473bf6d9b80521ccdb7a0a5eb18706bae1d8c667319d6a5225bbbddee3c8f13e655b2f4db849a670a6473cea21f420fc0b2bd2d8f96253ff20f88f6142b82a2664f05776368f73c5fd7ec9322a6ec4a214a89a9849a572f6d03c (encrypted)