# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
92e21bfc545e95196565b9f62d36476fabafd61d9091db726dddfdcf59155e5b
Pseudo Output
6cab660e223777473b3d0248548a1a097bc0ba27aea87319d1bc911cf9736c13
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3c7d6a92e01d01535f0eb8753253ae78a2c841cf1efc7f1e17268d4769a0d453
Commitment
22216d9cf29f76e11d5a7551c7b4d2b96ae0b82d8e10969f6edcf160d6bc9834
Range Proof
672 bytes (Bulletproof)
Memo
0e1fef2f2ee27e26093c0a4d0e8fd64e7a590e8d937e0cd61867dbf7f7a369a2256cb83279d613740e882a4a93974ebc801d9f4de1da4680375e680b1ae1ba8e9856d56f9c30591a4097d9c02a3ffc12e9f44851aec92780d9cfde6fd355064b58cd3d4433960a47c27e075de0769a53fc6d7c5627c41fcdffc5c3d424112b79 (encrypted)
Stealth Address
2c133300ed864a635b161e1bf1887236262bf4efd5ad7a3c069a00d64d3c4929
Commitment
beff0f696cad034c1e22c4f158d933834d9849627f7308ad730dc3241884cc1f
Range Proof
672 bytes (Bulletproof)
Memo
d4c62411d95e400797524f82968d0c1a3683da03188a734a28cb3c3d88b06fba1b49458a7530f4cc39093a08ea151b53f6ceccb5e32cfe6d3e47084f8b7d81434b52856e66559ed30da04b5e2d19afb88eed684468a3373564d427d09660926836c9ecec8e1123759fac07d4d4a2bd7c977aa9de4208398167237aa559918226 (encrypted)
Stealth Address
02ab15732dd3ee134c98c0c8138f45a89b511154cb987100d1659df68e44422f
Commitment
c48d9a9411cda3e871e887aad52947d0962bb8df531e9d89343c16aaabf1f466
Range Proof
672 bytes (Bulletproof)
Memo
6a7ff30ac2553d3e988f5c89d134d0d73be260c9abe4f5f351cf275f97b20e4bb3f8dcdd1dde821218851ce29cec3d106f5a9c2e74ec18912a9667c9a60595701ce1f627cb231653bf0741e2300b49171fc6da36d9b276e7ee89321db4830515f626e0f0782493a5f6229ce430583013a64d7be1dfbcae7f70e1d71c9e9a9eb3 (encrypted)