# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6e499a80f049ab6e0ea3d5d19c978f1b8571fdbbaa9642b418131acc5c3bf917
Pseudo Output
3cef40d9c5dca398470b357dfd0fa3d4b0dae63457b991ffc62cb0cb9553965b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9c0c9cbc44a82febc409719f71adfc5b0fec5df95b03386dc7dc4a10d83f2e20
Commitment
a43ff62e15428b1c2a43c7024df0238f492fd629b9a2d9f34f3d512c847c086c
Range Proof
672 bytes (Bulletproof)
Memo
105bb22bc45cb5b54f5977d6eea4337c950d1243a4c9fde3273efc62988b28de201e46786366914c7c17aca5c59ce2572b169dc21499437dcfdf1c325c0c62ca7327568d955e01d1612b7120c0f5576ff22bae3431e2993a4bf95027d984e7c96af25fb924ffc8c0bf919494a48632cdfe7e4c0e35ea36059ae4bd7b50003e2d (encrypted)
Stealth Address
82d2c05779ffcbad85a124b70944a9bb867e7a8e1c155feeac6766146591fa29
Commitment
9e72d5755f9478f99f4c91ee7edbed7cf93c0824f30b72f308490f348939b460
Range Proof
672 bytes (Bulletproof)
Memo
e5101072dfad593e02cae4c511f604c428a4b21bd3960b376c8c0407eb425a08f7bacce3658dd66f54b00ae8c10ed6ffada5fec8cd29fdd3914d567c0e33a3833e02a42e51d1dc086e98073d3f5996f3bcd29aa5b708e0e631d77a420ddb0a3419f9c0c78734b1630cc6bb049596e9f5988a91f008dbc79a8d6f6bdd3321d71a (encrypted)
Stealth Address
1c65fa35f27ae16a50db798a3c41c8aec235ce16abe73e565d9d1e3ad615c36b
Commitment
e4208dbb67a2b43b2775ccff5832f9f3c0a2ee379aabef6ba45dcf8daab99108
Range Proof
672 bytes (Bulletproof)
Memo
e0b52d7bb0e563cc40f6fe1751335362775cf26d885783ada93452790810f2aae338cf474a42d09ff01b8676172615af2dec638211ca84d0669621c959e33aaa90dbffd7cf9e09233d08b0357c14cdaeb0923fb8453131eeec931fd9671c0425fde372d20e060ebc98d3af509c85ee9659b76f07f1ea2301594b66af54a3a6f6 (encrypted)