# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4ce822d9c863b15b0ea460795c7079b9af8d1c7575ab50c5d0e8dcfbbdb63d3e
Pseudo Output
c2b2c78d38c1fa4a25b0f70c6d34a2b3ff73d223ac65f577cfbc4bfdb47dad7e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
26b7f0902d7458c04511afcd3eafae293f44aa22c3cdb244c55afb17e5d1266f
Commitment
c008703f4a8e637d4891a5bafac6a0bfd4e64fe2ab5e3ceda8445a65211ce60e
Range Proof
672 bytes (Bulletproof)
Memo
6fae374e0591365dc586c9f992738455f2d3f9717389c3ba223126f22e239b8f44046251c57dc92efa184b597f9006b2f8e9215907bd35e37c01b7095e8909414018a03ddc800ccf63dda33db0c7d583383d262a04c13d624643270eab1617528bcf129ba5bb8967d9db625a9b3027ff8ae59363a3e6adab6bf9cfd5683480a0 (encrypted)
Stealth Address
487511decae37967c8b4959378075433b1ad64966b438b22963b922e8d6af853
Commitment
a41cd23b719263f861f5b439f8d78be93b733ab02ed12893bcb7da64d94eb921
Range Proof
672 bytes (Bulletproof)
Memo
e4ec0835acff3dc65db32d7867947210eb645418bcf770dd1431403f0b114aee4b0219ff75c18157de6847105f999e2af4d74788d06ee413f3bd92f807bb2a75de1ec404c2bb74ffc47598c79b97aed967288aedf2cd28b5fa66e912f014114fe345efa75b0ba55ba1fcce332f4b90928cd9bc53238c1a4d36e3e3c0cee3fa9f (encrypted)
Stealth Address
c29c0400b8d0d02c4811f7bcaf4f3c1041dd813677407cd517167e2ebfbf0c22
Commitment
74ec9b04262c5fdb15950ecb71a27b62970cda3716cc36bed3932d5d1b305f57
Range Proof
672 bytes (Bulletproof)
Memo
92f0c5dc2ce216c2f0ba9e98942b5812921b79b853ea2ca263c94e9666faf9924a6fc432e2b2441bc22b0ed82a2b14dfcc1f7deb31d86f0508c68bbc9103c7493fe7f2f90b5e38545baaf2d81c283855e1d86af3c69c40d2f99661aa7c0eb1be315b4a39baad87c178e2cb0962337862d55786571d06ee051af01e5547562535 (encrypted)