# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fca3f770885f6511ae2696c4682b008c5423a220f24e106de4352376af7f1070
Pseudo Output
624c7bd8a3c6f10a53e1ec003c28d93a4a06ab9d2aeeded1979d21d23fea7175
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
280e2ec59dc4cc30e8d17699930d656089e3064567e5a9b87b2bbe5c491fc64a
Commitment
007dd30a0e554b10edd935dc28448f03bb80c068eb4cf46010472343c92d1011
Range Proof
672 bytes (Bulletproof)
Memo
8b7b4bcf1399ba62e83fc6f77ae94d0a0fd6206544d3fedfd86dd4bb9f25d2b373d6085c99f03c91aae06f5aa00609eff112f0de697164d24ee1c4ee8d0bda701a687a0d995950d27698bd431b0cf77994f2de26aaa82d222d0e801f5ee45c9ebeb8978513d5c96f1ae292c669fd63891375c20de6b192a147d54fae59cd9a83 (encrypted)
Stealth Address
943d1e5dabd8aaf468841976e3134f05bbdd7364061ff89b6fc88138f3cb7237
Commitment
f4888b03b24415ff072ccd42e8066e0caade8609006739fa991904ad72ecdb27
Range Proof
672 bytes (Bulletproof)
Memo
2c7c29fa7815c9727d725c6a706ac251b8cb11ba1a555a320271346cb21b59816ab6ec0d10f0ee4600de696cdd45dd2cffd2b1b981312b65f33fc9445ed9260a565f955195694500924098f33c740a50512fcfde3996f5702cbab62253c655250db3b48c9bf6338d1aa1bc5c6ca81ad34aba1077e637098cbfa3a86341a71555 (encrypted)
Stealth Address
826264cd4de8589ac7bee3f60a7d7a5df1fb67b312edaacb4abb0ae8fb10a366
Commitment
2ada452ccb8fca87aa8fd9596dbc46293e2d1a4711bbeac5f6dd8614e82a4004
Range Proof
672 bytes (Bulletproof)
Memo
f946a37463786c5971c41ab0ff575407fe8652d287f2ead7d985aa413e6321c63b57426f08e22690fe3292c63307d0ca9996d5f788d8a46546f153fc7dc0501283d50dae0906ee44fdc69132c3b9f94d714b87b2e4ba33ba5e3594298dbf2e5b4b2a6044872f9dbc3f68347cb1721fc87dc5a6a1c9b43741a2cd66565685a7be (encrypted)