# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8c663956c402d8b928a003e2e245e3f6e17b391a2c7749c07b979df71ce6d541
Pseudo Output
2079d975b699246641ec24df2f7dbdce49ad053ad17861594eebaa3a5fe7ce4d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
722f07d09c563d83dcd5dc5996695413eb8c4548fb6f82f0caf1802ef5a53045
Commitment
7ae60090d8634f36af525d4d08d664d367e3571eebbd90edad6a03071cd84c47
Range Proof
672 bytes (Bulletproof)
Memo
c4fae5a246a1d22dcdb37773f1353caaa766ca22563c1f86035ad0cb71325883828617cc4f7a0df03c2c6c9140cd4b46a727b09e5bd4b90db53e6fc108dae8ac6ed5f23ecf77fb5ff24dd5686e229561f53a4b9f0e1d40e31768de99bd8735fef8aa6b355b6603681892eaccdb1c395dc1f68483d3222b3273bd1ecb391807c1 (encrypted)
Stealth Address
1897ba24757556d4cc947965b41dd5a4b215dea3820a108f9c3e19109eaa4363
Commitment
bad75243ec2f6c0a9c6852be0011d239b1ebfc6a4523c267557fcbc1849cf66e
Range Proof
672 bytes (Bulletproof)
Memo
fc130090d97720cad57109a2e82f4d09581eea5ffdddddfbba77c8dbdba99c72640885720b98947634e75f2a4d2093c845d2568de8a8c3e8bcdef5d012168687409b366c5ac62cbe7be7e16646517dd193a6e1018887164af944325df0007034b049ccdd95f79feb2b054b1e4b01efaed5c1e191ea9e5e9ac751fc8dbe3fc93b (encrypted)
Stealth Address
d6241935cbe0e2040a327df5f4a4cdcde9a0dafa6244fb652cb688b6c616ea41
Commitment
7a11f4129b6c617284801702f480982385e0128691462494be73940dbb54e744
Range Proof
672 bytes (Bulletproof)
Memo
a5ed0d27de87271aa4ec6de10132481ffc51b6780ae94a39165cff64dea2449423445932fb82f2a991768820fb8264993f48fbbdb9797128361cd532c92d70cebbbc1c3e4d26dc6601ea77fadd31cbf120244307aa3e07027c0fc8b11c30a2f5b5cbb009a14a585abaa16f9710f7a31704db5b3a3f8b21b5e187b83d094eca0a (encrypted)