# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c8cd01cd1fd37efff67fac68fa57534527b019edc25928d3ff6271fa89e36101
Pseudo Output
aa7e3612afc626e8238a3e3fa87217aa5c5902cc0f1890b4c3770f5a483e0d04
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f2833e83e6e534af1232184a559f91d88c7f4847af812cb00e0b4e740098c661
Commitment
00c502713781156cdc73c7ab1cb20a1c9ac502ce66760f3c7f479c175d691653
Range Proof
672 bytes (Bulletproof)
Memo
9db6aaaac167f1539d4e74989f4ecacac269fc7a4acf7463bc38ba45fae4f7172bccacd38eb2ec754206b92832af33aa962186673479b8c25a7679bc18604251090b636f1bcb6ad73b83b38c889a6dd67ee623ef014ae0a5d85c464526501f4e36829805ca92af7354b9c420b1ac8be63abe7ab52f5092b1164483606f042fac (encrypted)
Stealth Address
aac52b9b86aa77957fed1017242707f910b4c5509161611a991507d3c9580314
Commitment
0478652191e182c4a50938fd84ad4849853314273183502943e49e72e57db802
Range Proof
672 bytes (Bulletproof)
Memo
1c9806570223d138d06ed4ef904cbd5d820d45bcae51a94143b7cba7dd3fc9809d81f4ac075b7ec58810bef1a540a68adba67bf3d4a7cfedf282ca623c8d2a74596250d9c3f4667631af7f5876c8adda98cb3a70a3c653936dd193ad49a46c4484a52a0ed0573818622cf735a994dfa3ba805db8bbda14893d9243f11b872849 (encrypted)
Stealth Address
beea76a29d58b4cdbb87be4878ff664450153d25ce7a61550a551e65abe00f78
Commitment
106d9613329b7e829dc80aee1dd4a330508e2493b72c69fc736e64f12b094655
Range Proof
672 bytes (Bulletproof)
Memo
c35219335a0a5d834da6bf9deaaf7d8a3fee7d0b327bfab448383172fdfe31bde2eb357424f9952364f4822691e0c39663aaaef24d84ee4de9474125f8744ca7821f2f069404e7814847c4111b7a1523e2291c524a9cd597c0b2c11b872167bb4cbf09d788025e1b0733c7ed830d5c3b52245231f02a565989bdbaeef34e8410 (encrypted)