# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
00b511ad9cf53e6e35d73ad68c62f0bfaf3ffcdc86360a3dda4319918bdbd86b
Pseudo Output
9ab934e8d2831c51ae8491d88f5c14ef53537d2f81493883dadbe0a6e408650b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0e6e0b08f13c3684a564b916ab4e6c0146b286f58d26eed2817b55bc92a3fd43
Commitment
3ab6f4a70280a723f7c00fdbf0c59d52453ddd262ff018c67b7679db102a8c0f
Range Proof
672 bytes (Bulletproof)
Memo
cb52d61e0bc5b4dc3faf147e244b9f9b7b42fc5e74ccf84593335749d1c41a6b92d037367aa1754885615fd9a1927d01d3476a67b1ad510b9dff7108d22b7e1900887a70649beb724e427687c1545f8ed214f58e77cc7b7ba0b7cc6451ea577966d7c0f6d2d888d76d06489a76b1daffaa49a365b1fce5db109fc79c532795a9 (encrypted)
Stealth Address
3e360d83ba413079518d7cc415c32f573a5b76a3b2244aa356d87efa0d8c284b
Commitment
c05f168e80d842e985323088511aeae52ea353347d5f2d241d965fd4003e7556
Range Proof
672 bytes (Bulletproof)
Memo
47b771715f741830cedaff852b03189cb0f419ee6a1d9e97e7fcf515781fcf5852a68d78e9ae1de00485f4dba6371ed3d3563708637faf59c0bb8dfcd9bca6cdf05f6ce43d0e4c0fc378ed648629b33c09ac65ee8d9a3bbb5215a098a326411f10c79263c489c4181be4dfa47a7128205ab7e56a8266a671c37ea2f8e26a72bb (encrypted)
Stealth Address
8e3a0131ec4d2007b48c54a84fd2c851d9d5769f8f2a6b9031014fbb81d4711b
Commitment
68c948bc448369d45c7245f684e407d00a78413bf88a795e5477b37836ba314f
Range Proof
672 bytes (Bulletproof)
Memo
0f83fd2a03aa8a15853b4e9518f506091d1dd6bdb3775e5182ce72688a08785e309d56fe286af7ab78720d1dd99f190ef0c5debde1ecf2a38c5254782b57e66bd7e63fe1befbbd386fbb7b89c4acdb2befb21c620b08be8e459f57fb02fbad30f7b0aa723697dbc67d6c976dc6483fffe219dc33a4b994df034dc43a304c432e (encrypted)