# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9ac512c58952d92bc91a6cf88730542f00de7d61cefd8d803704686c9e7fb825
Pseudo Output
0218dcffe38ec57a10c2452dc2d79351a2326e43f74872d81569e74f521f967d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
04be735bec9eeae1e880396d2b5a967b98f37bc6bf350268b27b90602241b819
Commitment
0e8375b801349ae41fe34a79c18277ac1c73da5fa5e3a9b3331a96010b145f0e
Range Proof
672 bytes (Bulletproof)
Memo
003e84445f798c180c4658b60b92bf1822fc8a6386f765eb37b8598622a1c8ad17c5e0f8ffbe8291d0867c9b843f3e08b081a01a967aacef843d93576dcda4590af3bc28c45886ff71448a74057b0731988e1046f8c3ba96757315fe234e72cde1556e185bf482d7b4fc24ff625e1fb4fbc0baf2800ec2dd25b2a7f17986f9e8 (encrypted)
Stealth Address
f25b40339c44c4c29558abbaa338625895b78938769efecbe1a5cd5cde8e834c
Commitment
acce5b46cedb8c1870efd22c35b978a3c660b3eed70f5926666c2009aa533650
Range Proof
672 bytes (Bulletproof)
Memo
3b7dca481c3f860c5af74a52498d4d3480987850f5d7724e2fae9fbcd8b4af6df9046833d6d7c7e5c856f2c4a04d18171ce88ad803fe077bcdac97e5153ff44472084347d68498739d81a20c8a40bd4662847ac19dda5cc03bad9a422439091e02b39de5254c0b6b1ec0fd4f38e20a31381880f64b1ef96a2a03b8ebf9e258ef (encrypted)
Stealth Address
c2b47d98592bc81257e5000b95af40661a1f4ea5686b6a75e91040b27055f734
Commitment
e695d480c9368c16bcc817c8e56f0b4b254d043c32316139723bc400ec2a794a
Range Proof
672 bytes (Bulletproof)
Memo
e4c37fafd18bbce8727171f662dbd1b73cfecb1b8675c889c1a73f344ac09bddffee98cb3301696762e8ac726870711a3e35aa25fdabbce72ce9f720bc930d0091466928666103b2083180acd95fd51284705d51fbab4f5aaffd5375b510cd983152808e0987a7fa20bdfeed52fc221a93c3984db4f898976e98f2b64be307e1 (encrypted)