# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d642cd7f4bc95c4c8fd133fc3e6ecc851beabe6438bf44ad9d4a82ed8f0a2800
Pseudo Output
1241ceae7d52a97cbc5e0a24f43359177657a79af1e6541a60ebbbf64af39409
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
985fb5a960e3b67de0f2549c0e6c4bac597b77d51f00b9ccc9cd52e7a0ab1243
Commitment
2e7f610cf1e5266caaea970a4e9dbb6a2d5ea0a9e95223b09dc084e69a3ce408
Range Proof
672 bytes (Bulletproof)
Memo
f3162655eb19d854049676fa4a9441a82e734a74284232b1003d25928330e9a42e3e5556f76640ed987366722c79d01846f8b234f259cd3804faf276046545bd479380564ade8b17bdc6151094a3a814b01a377ca3a93ab4087a03fb7d8e677eb96bfd1ff5a8962c317af9b17fc503f876644a5210dbda75ac81df387b87a2b1 (encrypted)
Stealth Address
223f401613d106c32f809bb1c8dc019d0a4b8ff84bb1b70acce671124f9c3837
Commitment
54185462195819113200ac7255af5f139611256a2451fc5226d1c63d237d1c2d
Range Proof
672 bytes (Bulletproof)
Memo
d025d596257293e418715b50b91f4c21f8a429ca8dd49bbdc4177a1bc2b39427c5c1f9eee339f00d5355be12f6da6b45ee1a74914ffa47b431230845eddf8b3f1c75e12dfa2e2ee0263f30208b7c85da95a57f6e38ffb276fa57cc56fd4f934012c248cf839e186e6f229538e2526170307a38c51587f01c2cc74215c6a75f67 (encrypted)
Stealth Address
10783dc3690e5eb14fcf44b2e60d807f2d3027880f954426698a6032a69e9f4c
Commitment
8cda5173a77481d8a288ef1accf41103e2e39e92a2a6291864183a7f98740547
Range Proof
672 bytes (Bulletproof)
Memo
a9ebcad243e996bbd9f4ff9ae59db7d676582b31daca6261da6ca3993869ce24c39e72afc03d79ca8c1ad16e819a69867e9b00fa0b3327217b40847f3915de5238ef2330e5d5bfe7426b40d1c5c3621ef7957c04e191f8e7ce593dbdb4c593fab334c5d55870110fc82cbe0aeadb59c7855f2e2d7289ab8b665c80e0f954390f (encrypted)