# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
dcce0cdb8d904d56e23e915ffe591eef88a429dabe7dedab6152228e7a11ad76
Pseudo Output
4c1eb5bc9c3a0a20af8b5954ce71011226b01cff61d7f59616968ad00527845d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7c961f615a5b5895ed712f566a55dbb68995df85bdc005efcf6bda6b1b5b6717
Commitment
487c7a2d0a7ba7afd3d5831dec900899028cb0085418bd17785a1f1a389be705
Range Proof
672 bytes (Bulletproof)
Memo
365c4813ae2f48f9abf4c23f4d8242ea0267aab4fbea8d52c149a1420f1441a9ccbe34016d9084cc42757b0249058954fc3fb8b349755d31f28b7e5349345567aa93f8c944f2a8bc1b7de7bde0fb805f69421247a71bc885b466f0e9c0aa4dd45d11a341a1f7066477209e3fffbefbb20588f6779bb69d6fffe685938b2881cb (encrypted)
Stealth Address
1047e9b4fe0bde894d8f51149e4d42e61120cf397d76ea876033bf5f9ffb375f
Commitment
b2bb0118755e162982921dfe2900a5bc6d4c4addc1ffdb21e2120ff1ba695344
Range Proof
672 bytes (Bulletproof)
Memo
6f0a184143aa841a1cdbaf492fb5ce7c06a09cbcc9e0747a94ff01aee21c072a74cb110af0b139603b6c014f878174ef0de48d70f34ef8f964559a39bdca7c82315eab13e85d716500904f36a59eaec8b23a8b1c5b661a9eb6b97883997ce913488a229a2d0ff14a801b6dab600d57d524ce91d5e17714b3b9ba3dfc8cbdfbe6 (encrypted)
Stealth Address
78691c86d440c9ea1c745d4e4b611b9bd21100e33617235f62e01368ea0d2c42
Commitment
14e5d971becaf3473bb855eb23f41c0cf2e1a0a365c9d8b8be3df51535f2102c
Range Proof
672 bytes (Bulletproof)
Memo
ef0852dcaaadec5c158a1ebde39436190f5cbfb8880e774820e704a40c6feb6c45d07b5e2d4382b22dd1e86878951a33848820e57a531220bb51384e115169ed1f62d1c83340d37633f99c462a4a8916061c6f4220a9a5afb9a2359bd430c2b661805f569457ee7bbd04e5ce127582e92df0ea5af0d2317d5e62c6eed33d5dd0 (encrypted)