# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9eb52dd93d0a41c94c58594425d45417dfa360e9c1cebb4dd1cfec6d1a006804
Pseudo Output
38cfc86c7dcfbcfddd9f45db66e95adb0701a55ff4a81dbdae17de2c9a53af1c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3861eb5a7869b651de85a79903634acde20d442877de8a9f380e3f8b18347832
Commitment
d02295ca06a1535e32248177d4125886ca9ee6407b94c1fe041f430586d1435e
Range Proof
672 bytes (Bulletproof)
Memo
c3f418fb3ce3362ac9b0efcf1a4f7390484426b0b7a8cbf26e8cac6b8f9de9f57d67422f435554e622318734ed9cca52f51750990d39c292dba3297439858c2fd7e4f7401223880e85915fcf933af2aabd9e339a761fd62dadcb54555ee8e83d432e9da27ded90b52c8707956c7a9a8b6bc20d3328e3f3a5ee3af4224446f5be (encrypted)
Stealth Address
be200eec5bace0c4d31a1177b53fe19e0119f018704156329ac8314a8ded1159
Commitment
7a956c9fba28efe48c867d5c087b910cacee74d3b05cdb0d6c66f06f719a1c35
Range Proof
672 bytes (Bulletproof)
Memo
5c889acfdea4307efbb2e576123808d07786438af0cdf731bcf3b8407d676050acda8671509936d0f5b65a0a1494fe0f58f268be01cc203ee73c30bd2b3ba618a855437c67f5aed6afc4469957c4f037f321277f848a7bad1a41675d9ce0c11585db1db7d662b43f49d696084cc27a2a55199f3279773377b180c3f9788345d4 (encrypted)
Stealth Address
24ebcfe7b0dcb1149cb4472354abc2fd02623a08f02175c4490b6e835970a122
Commitment
30d9a1b7fff9b1726d291965d1854c48c63ea95556364c8ba928ef9c96b84f09
Range Proof
672 bytes (Bulletproof)
Memo
47a5548898433f6218dd3daabab92d91d80cf9b831533799c96f1c19395a39a09ffca27c323f85f90088ba37c4d9179f7d622bf24a359ec2634ccac31b22c670a1761ac7789d889b4a0f15b659d9c6a6f26625af6bba90b17db60d23dc681f0e68bf408be3e37d32656c2e8408cfe0af003e569aa08cd58564082097e4fdc26e (encrypted)