# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c2632358752fb8f7f2b20725e42d71cb5f41c8475b573d00629edd6350c95c09
Pseudo Output
b4d802fb176112416e208e9185623c0c12a1b78280cc4650602347a1bbf00051
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f65cd3c5fab4bb2a8c29aabe7f57188f765e25be3d9e5e1963724e00445be425
Commitment
20fc350bb23042432421882b7ac642f575e703590bc00d23be89513c9b744501
Range Proof
672 bytes (Bulletproof)
Memo
3830197ecfe716ac1e174f366eb8127c016757a0d67b2de646c0364cdaa4df997242bf223fdbf39fdc0ada693698e01ad4dd6d150b0f49edc41a64b9d0c2dce517e67cf524286cc0edb0db57cfc3ed1a0a2e33a8ec0fd553e6fe2504c130eaf8e8dd76cdb7d7023c4024f1a25c57981be5bbe7ad74efae4852bff08e3f055c68 (encrypted)
Stealth Address
6821bfff69ea5e6c49d0570bcb10441c835802dcc8aae61fdbef992294c45023
Commitment
52e7c4787cf0d308709d8279a2884a30a5ca03a1cd3c1aa5f4f46313805fba3c
Range Proof
672 bytes (Bulletproof)
Memo
b3f0234a995887711242965fa86b225961f3b21d44029d42fa2306a819a6bf5061d0abc8ca44bf0d81c60fc328ced0f6aa7ffd39ca8495733976a190786d95a5ca31cea5d97e20823bbff348a83aa3dee6d9f8edc336f6623952d37042a038d22e2124d42905260dee35986664e13295273e993c5429ecde4795f3fe42563348 (encrypted)
Stealth Address
e452db0036df18b22d4844fe89817b83c2197609f5a52510a982bb4024d7dd60
Commitment
401191b7167894984c2d252d952f85c71f7eb2c334d458a163952502a6b75040
Range Proof
672 bytes (Bulletproof)
Memo
73c7b2f3cf37342d19fd2dc916fc3464efbb0ad79438048d914b4dcf2d19a155ce164a21b5243852b44a155ac3eee8a480715129068f6386cc863b046cc9961c9ab0e01941206169b82190eb029505cb6e7fc44950b2dc2b7d53fc75b4cb8c65dc15ddc9e7ef341b264a07432913abc2f47877d842859e5991d5017856df2b06 (encrypted)