# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c0329f8364a3c8be095671f051da9a0c1f9dfffeeae5f8c78a85601ba29bf725
Pseudo Output
4a889a8b313c7b507253c3bd492399631ce86e1c567d907e0626f1ae2bf08817
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3456ba2639b12adac577afb75f9fb8f08d0fb6ecb897bcd35177fb68ee658b70
Commitment
b06cf558c43627e97a757ed97abcbf6ccdfd88c2c8b38a1f63d503a0e1154654
Range Proof
672 bytes (Bulletproof)
Memo
e477bbe66ecd1f25ad557eed17405b1a4679a3159ffa4575d9249406d970e830ee49482cd5505d4855c9188046059e960319c6d69383906cce6d8053b41cee967131755fd013ef1e374017842d4e1f2c213e143bfde7cf4875e940094cb8e3d41a3881ddd49977a8646fb881c32af151aeab191ab0fb4c12700889c3a4c672e0 (encrypted)
Stealth Address
92b25f155408e99866b1c74cb7d715a37ada1feb209020c6e4aaa4ae8cff7d03
Commitment
2e9468f18b64608f30939c89b52eb0403cd02cef82c1503c6d6cb8fde36dcf59
Range Proof
672 bytes (Bulletproof)
Memo
2d5eb27e744dfb07938ef73a8d868369fda22d9376910e575ea87b3c181d72311cd2b192bd7713c5b03aa05ed71ecfba858418347ed570555004d872ee73d1f3a22325aa38e69a622046849d373a4a0a1d59514e47f486b354838fbf5e46e920366fed9d7bc633bf87389e0a5ab44f3738b977e040c447fb99ba3c73565d74e4 (encrypted)
Stealth Address
107e869b908b74fd197333ee8ac527971c3d7f7953f5984c780fe7b01e15c93f
Commitment
62f007f9a14949aa06d8e5a53781c38c28071723cc067f7ccb14b4d06d69c23d
Range Proof
672 bytes (Bulletproof)
Memo
ae1ab3e8f59310799dc4348c22463b37a8f60aea8fd8de102d1d7af8f6a233b25349f1f73291b38aac74f46c0f76c56deb6b0032f10aaf0802748c4c94160a6163e3457135a3cd01efa98c712e35820e9b60a28796ffa4e87ba5900fe7bf1d576cc2f9972714958b5cf3573a082077192adf637cd2c97e439d4f4639785f5a0b (encrypted)