# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3e863181c6ec55de07012c1d1619eb35b517c7278aa1a4ca4b1589b9bd3a9671
Pseudo Output
14725d2f2da738441d5b58a2f9d20818aade1687ed57a5870dbadcf9970eea7f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
febe928c56e4634f823bef50f8fc36c53b2f2a7f3496504257d721905eab1779
Commitment
eefa0b03f1849f618bf17e29a7ac2f6950a2ec1e5b7dc720d495163199439576
Range Proof
672 bytes (Bulletproof)
Memo
fddd2c6977ff5646e98f1be2e644db6db01e1ad28635300d954bbab8c31191615d4fa423762b7929f6baa7fd7261369b2b79df7d2ae30f4e6bf44c937d9d7a3730fddcf9f7d6262e97bc867b6a37b88e0f135699a0e2006cc466855076cb3f4ee0fcc94b1fbde5b2f8469982bdfc90c2a13634cb81cd96814d7ab07d090d91da (encrypted)
Stealth Address
10fe340933bc05795f1c4ccac9bb8863dda028b433f92233486b8c332582b534
Commitment
8ca986b8526dfb7a8c1141a55b5dbd0443d02c5e99d584702c42c759c9a64552
Range Proof
672 bytes (Bulletproof)
Memo
001e8aaae12293b479f8eccfe220178ad142b1e511d3a6efd54bcf5375874552ce6b6977346c38b39740b401e71852ac020457bacc9a6d553d3f6ae00658163b72c46ab75508fd76f61a019af0e5babc7046e93e5cfff5628df6f1823bd1d8b3c53a2e4215e2c2c902dc61e8f9f4e2606ea3fe49718e0fcb3f6a5cb616474477 (encrypted)
Stealth Address
6aa6a61a83d02e606ef34b9d03b8c72a3e1e368ad691e45042344672f6bef609
Commitment
8a1580299bfff5307bb8b9c39001ae2150c31753c1968dab6c2264dc9f695670
Range Proof
672 bytes (Bulletproof)
Memo
32819c230a8cfd78ef6a2bc362d24779bd7bd56deca54263b3328e1d4c5ca0bd7d16b15e792c32a93af72fee30a0f99b33b1a03ad86ed4012816acd697e774f6d57e2c0340b46a0d38e4e8e071d73f791b6f9fd81968d05c1e9f939c6526ab4c5cc578e138a762e2ac062edb703dbd8fc8bc4f9a80579f9aa2063c5e3fac4208 (encrypted)