# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
784df404fac1673879ef7db6996bf9a729ae0f5281be6f5685869b9840f57e64
Pseudo Output
02b95c126d2aee5f1c880c26d7d778e4d8fcdb4aa5f2440836a6d4eb4b14a62e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4af9a8a5b798ab11a935e8c766b68ed9e9f9d4e8c1cb31ebce8f50af852a0255
Commitment
30548bac9bcd83b50c6c4b9a485fc768185a407043c685cdba4e9403b9eb454c
Range Proof
672 bytes (Bulletproof)
Memo
58fa787cc690fa5afb607dd29025ffd59ab16bc8b55d8c9108c90ebad727eb7b80b4e610170adb27926aa58b19c4a65fc9bd6201679764119704b0f73958bb5d78d19e06cc8046c7036c3f6c039276ad0d713508d7f54615f1328b172e38f7bc62f8094229f9ccd16c9bdd322839cdf0ef198c64d03d447eda1d2092bc5ada0a (encrypted)
Stealth Address
a2998192493592fed3708aa9224283ea61c0b931ce0990f2cd324e5adf767174
Commitment
38d50ad6e8dadda8c54247141f82bc147e3f50b1a948128bac1e9739cfe08f41
Range Proof
672 bytes (Bulletproof)
Memo
e0c788c8d5d3390d4395dd5e082c52d32e5e5d773221e99302220b4520d531a98e2cc8fecbb93980b8cc9e3b007a0270c98d82f1d958a750605dac4a91814f21d4f8b8cfdf9c193d76f8341c36f01eebb2f0dd447adfe452ccfa4d90e61733f9683c35b950cbe96be5d088f46d1ba5673eadc9e5ac9c409359412ad8309ed1be (encrypted)
Stealth Address
3260b4119e751f8ca8a754c9ea61d7d09f7f7cf04a0621055aec7fa7f245d618
Commitment
fca0f52fae534408b8c67e4f426d969146c0ccf030ba40fa28e5196c4f63572a
Range Proof
672 bytes (Bulletproof)
Memo
0c5ccfb929d14a39bd058ca79afd26675e89a40329f938ccf6aea8225cec0fcaed8e3733306481b93df2071cb04f71f45dc603d79702d0b51b171e1af7fe31fadd6afcee657dfe0d27b32d8148d73c5e2b0586af90f80910f5f4356d42745b4b3f6b81ba9b9076aff12ea0f631ed990526138ab5cbed3cdacfcfc68781187321 (encrypted)