# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
929877b4a9b27376140a986d833791192c820b0f818e960795a4f978f7fc0259
Pseudo Output
66346e677dde5909526c4ad1e66a00f4339b1783271c3e464a6b7947d2466626
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
18b39ef105fb69a86562d93cca29a86105d9b164c50b1fb9c13ee3858b9efc06
Commitment
d8456a796b792717b7eec6cd1e7a1cddb92a5e0922e03233947bc8417a419e6f
Range Proof
672 bytes (Bulletproof)
Memo
698fe6e70995300af6600482db08c5caee604d21d674f06255303e00086df35fd8e19cd0e5637fe89aef737e9084a0029627d52ad5f2c91ec5f28d671333d88fc7f8a5a73b922b7c01c192d030f3206d76e23e7948cc28d159cd95090d919c76c0204347aae17a559f49052176b25cad455e59189b215d443ab8a9b17105db4a (encrypted)
Stealth Address
9abd4c4c3f1af8c8216ca920370ce74577546cca354ec74d6712aca7c5039f03
Commitment
44bccf2225f532c1f54042b4095eb9b94e09e2d54e1e31dffe9ebe96b2f56b49
Range Proof
672 bytes (Bulletproof)
Memo
c4121ea9a72c681adb96b31b7d83a5cf60544d2905cda0a4f917592d0783bb065733093e8486ca31fc1c8c78d7d0d679ad1cc1210ae11e853edd84b22adcae2a5835ee3878a41e7e1fd6cddb699d419a25036ae4fd4ddfcfa5cbef1be1d1d03a5bdefb0574f736d1c823b4d24dd72ecf52489afdead414c1dda38662780b4fa8 (encrypted)
Stealth Address
dc3d1a272cac15b895d0ba857ecbcf1edffe3e46f40d517920c938a437b4582b
Commitment
a8485359a7f5dffd0e5d240301b5b4d0d9338321ff9f0851477a102a983ed427
Range Proof
672 bytes (Bulletproof)
Memo
a992c218775a61d54440b0b991ea5936dc6ede02fbfc47165c59fd7dea2ac2e5b7b5d04692c13f04970896b0cacca7741601ab6c359bf07f77bab16cbeb8151942d86964b4db5af650f67085b51c838d4b4f448b00e27500d079382dda26965d820620358197e2810fea6af1d90fd4fd8932aef9fb0f512f9f9be055977227f4 (encrypted)