# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a22a595727e2af0260fc74c50bd36a357c9f469a19b9edfd9a47584f064a782c
Pseudo Output
00712202acb9696f85c4d6373a9bc9d52746b7df6add5ae90868a13336ed0c5d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d00746f303b6c37c51403d715ef4f4dd0f09d4c9adc13b93a82c01f37ebb8e08
Commitment
08ca01c085d570b65eebf9d9fa2576a33037aa12232578bafb68c84cdd95da68
Range Proof
672 bytes (Bulletproof)
Memo
902c09a312df10fde8425e93f9330f0784778c3b9fda3d2af53bf33399e534e7368fb2bab249b0848dbed2ef090e0a8b2a7c9336a696f2dd57eedf6aa434ae1b20f920939a467d71ac5fd8e123461972e5d499e80e3368ef37f44b87a25e003c8d27526817747c8377b42fc50d4668dd9b772f98a1c8d858f9dcaacdb1dca3fb (encrypted)
Stealth Address
c648079c4615ca3469bb812b3d9803846527081eba11395c528ece539c25920e
Commitment
20a558959bb9975b045a51035d6b7a7c59f74b7508d319cc8121c6d46f36b559
Range Proof
672 bytes (Bulletproof)
Memo
1d630f1255efc692c131619de3557b016de1806d593bdcd4e4e6a4d57bce4556ee886fe32033e7bbe7f285010262b82ba6e86cb58c72877a27752f54a95e2a6d4fcee673442874877b5a904e66bb673530f645d83f90991679e319d12c9e68370f5e7b751e1b896b50816f57cedc7a927900ab4f7b3a9d216c362b343a372fbb (encrypted)
Stealth Address
9638d2998e1d94af9456701d4ed1f3c1d652df35acec37f5e58e2f870482f53a
Commitment
5472930bf339dcb56435bd0cd5ad16404d976a5f8fa6ccd6c2f4fcf33e573c44
Range Proof
672 bytes (Bulletproof)
Memo
bb734545f101912a0c0da85145809fead4cd03dc005192905da5f64c74d20cc060351d9e14ec04822b32d2b205319d38d672ea792c576ae07e86a4ca6a1f8748278c2a08207c86e31fbdb77ce93377db0bc37b54d9352c7ddeab69ed35db9562882821c22353fbc75ec859992eb9db320f5cf78383afbf071b6ba8ad953cf88f (encrypted)