# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
14e0d9ef72160b44f86ac7e93dc04be879430f2b80fbe6e4f1488c2424f22d39
Pseudo Output
c87f1168a1da73251c0429ef2e9f1ce105f25561e310ebca28234196b6bc2336
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
54299be970c672ebcf6e4a51b240c7c72b8b862f6a288af8caa8a530bab26a4c
Commitment
9480b38ef8fb33c66b1671ddb6eb4c51d3abc29af3b0024fb376c973cd3f4059
Range Proof
672 bytes (Bulletproof)
Memo
99cb82bad4f51236a566c5c007e7c6ba11857c2547f60660a5f5faee16c4a49f298ff2d819687d715152e819c06be18082f1e5c8843856f2924426fb399c411b389574007cf8a3b339983baf22cd65df03168e69465869f8815a30decd01f016d9ed4f6aed5060c94eb54d1ad96fd1c0648cf977ab08245d5c48c86b21ed25db (encrypted)
Stealth Address
0633caf2f6364da6700822090a49ac8763e430e89b2b74bb192688317ac42630
Commitment
e80370e84e7ff09f41ff3134a2edf806f5f31899fa8172dc4d8c3e7312db325d
Range Proof
672 bytes (Bulletproof)
Memo
3619eda88a277587d0d9e24da1a7b259c4e4b49dc9e82a1863cf88ad8c2fcde56daab12fd2ba3f8e5f43fbb5238e5c6e00cf59b74bff70a127f01ecf6b194ca8820f0d59730a0e5f0774714552a5556aa981fb3f3c734fe10c02f3c86e8b83053f9ee2de0e061b7902bf9993707adcc87f5d2981e595aa4ff78f41dcdd3ab525 (encrypted)