# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0c54171ef8bd742ec45e5a697c1fd58556ea4c12046e2168e177829a1cfcf946
Pseudo Output
a0f0a137cacbb548dd51995c0eeb508dd88d9b9393095617e971b3c8a735e95b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
82bec1ba7af1fb81b1b7fe83e156810fde26ca9300004af26e8ff59b8b8c2821
Commitment
7ee1290a7fa91ab79098912b9d78be7cc0e59438994f6b2959f7d5bc0905a920
Range Proof
672 bytes (Bulletproof)
Memo
c0621b60d1bf7d27bb70b125a402370c964e98ee38e72b32e81480b48df23a0491da9a58a013b6740817625352ef207c09c0db1f574af4d634b66edd0e64cb4a60b764de87d7083507ae3e429e922ddf785607e64ec5d102a0cd49fdeb5802152f7af5701df8ef32a221225ff21f3efa111b36a2a44a57b9a82a4d390bda706d (encrypted)
Stealth Address
7689ca895dee61673fde1a154355d64a16a729c7f2425365a2ac1f7a5184452d
Commitment
bad11196b2267809845dc09be2b3cebadf24c17dc3bedb80b83b7951aef1c23a
Range Proof
672 bytes (Bulletproof)
Memo
52e20fd90c5c697e214d61bb018b69dfc266ff7fff3f4c8664b790a66d5ef29ee0acd53a8917f67c2aa6a705a4872108e1a3c3e2fab61e3f54175c43e83dd1ef52cf19c462b850e6d07f7e4ff2600d640f64a0ab8c399e5aaaf7b3d24d047dec1d739c3f4ba908f182ce940ed88b08d898fe7213ce2ed1ea352fb19dfbc54665 (encrypted)
Stealth Address
da7c3564893d2771f6476e9a8e0f8b39fc8efada5b426db09a7cca7c1b6ffc5e
Commitment
8a5593164a2d2227238e776606b4804736ee2cb012cb6b10c098ea09edc96b48
Range Proof
672 bytes (Bulletproof)
Memo
50ea0f59e176ed7a545ad289328ec7352b6ce22183ef7b69074c034a723a0213fbe4ed2293fb501f19f2185fa5be0b230949a0fd08af5d60276d35ec1fa26ffbe6aa6d253629bb8825fac0993834a74a6434a1483f2799c3dde387e29b805c7762af2d3946b250f277518d17a6e122d35119e59ea55fcd554def22e42cca24ea (encrypted)