# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0297d07f13e600369380da9fbc73f6efbc725720be47e16fc4a0e5ec0984564b
Pseudo Output
18b32044e28c985a6198effbde4e1891810f0411963f619ca50dee496692f264
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d462d9a062374f279a283679c931ef1fdb00e952498caf97ff063eb211120915
Commitment
324305297b5dc783411f1bd1742e9d7d74d7a25317c89791ef650573eeb2da27
Range Proof
672 bytes (Bulletproof)
Memo
ba85cf54d6999d105e0fc054027eb2c7a3d5f97ea3c8018c45e9e57aaea575fa431cfd7288c55994b934ec9ef6b973f862bf4c29f80bc10d956abaf610152e033a6792aa641b2e611e45067aad356b04fdde52311e545545906ec9c7fa9a5c88ebdeceab6afbddd3b87c4d50965c0311be1163c2a28eeeb20fa04af5645937eb (encrypted)
Stealth Address
28caf44eb456c50b44475f1da7010fff9e3709d2ba0cc38320a0e203d7ae6738
Commitment
8a8295d3f268520890b210b0ce4a757dfb69b8d92b8e96df0ea6ae01a1a31f4f
Range Proof
672 bytes (Bulletproof)
Memo
4310168564fef117f6203e71dd981d4b076318ca689e43eb95c657a62caf6c434ce4b4be1bb93f1fa12ed6a3d6e6fe330770b2230bd7992779967ee3e657364911baa538bedc988bdb3b8347c412c18cf80e31e78c9864801c2a3cc32424b806612d5fca558cfbf2d394d2f03f5ab1175fd093b390ba294755791be0dc7f8779 (encrypted)
Stealth Address
3a42ac413eed0d1112d13c759d056539ba67e788813bbf11a104d63c1f46d641
Commitment
14b5e86d3464c91d27d00dad0cbd555dedf6cdb33bbf07d3e3f39884ba731632
Range Proof
672 bytes (Bulletproof)
Memo
d12adb38e3c115f34655f695ae559603ab0b212f528535ab199dd4ececd40278fa108cd4f9af481354db69df7c533d3872cc8aa5cd4695825c7bbc187ef32e5563d17b6973374c73261469018c7b6e164149c00633afcc7cd3387f2d12e674a6df7bdfbd732e67a40610c8abf0c936293513b04a7a60ef434bf68978feb6f590 (encrypted)