# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
46528e60b987f88dfe3a70fbc2144ba7f0fbe59f477c7f3cd2de743e72b9d72f
Pseudo Output
16b95acef4a2f706c0c724c6a693b4d81ad13752e464e7b14d0363da78f57934
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
282e9f6c1b9ecb9504cf3fc68ad3bd63187f54926a5cc0ac6c202651826c240c
Commitment
3033fd8fa463fdfd9c86925d66877c1a109819f951a8a21e92be2eebd58bed7a
Range Proof
672 bytes (Bulletproof)
Memo
ca280d5ac80d2f0a6ba271f8bdec5582469a2a4a693f093b7e3674f8e0491d567362b78c388cc0319a9a211f2a3fba580094d1ce11a5a2fee43e291102d7b9711b9dd36fdb892790c0f77f211fc2b81790061fa4c0908a50b9391d644b63741aba786a0ab8c218772e59b29f81414bc45c862bb83d01f1cb17df3561a7652f32 (encrypted)
Stealth Address
14ac33e395a032f34b364c3820844593d18ce90f77211fece70eedda82861612
Commitment
2099c9f0b1b3ac0da119e8fe2b81c9138cdfa0a9bcc90a0b8546b37a4844df1a
Range Proof
672 bytes (Bulletproof)
Memo
ca3c1e311ee6431c1419604a91b3a769f260c849e56cc2fe5e04f66104e1fed8f2081da47c929218c45a9dc82ddbaa9499b4a5239bd694064bf1ad180018f8aca285b44296c232d7d42493a63bed62261b394130c6e53708c5031644c4e7d5142860addce4cab3f6141a354c08f9710afdfe99094798822ed6918e509af700c5 (encrypted)
Stealth Address
a0c5654eb9d6af64e47a55469e5263aed744cb24dac361a512c5a9cc31a6957b
Commitment
1c03f6889d6a290da24224c4412dc03dc52b58a45e19a79f00efd86ab3f79d01
Range Proof
672 bytes (Bulletproof)
Memo
37464018666967aea384ef9a20e8e540ac32412e9169e475405fce762a6883370aab42b81bc8ba9f2e9d73c6cb6bda11524901a4749c06639392046dda2297b0b292ed701782da007a1613ef964c09fd01878209e921365349c5fac4a5c60fdcf85e8558c55869554e6bca1bc753f6aa4278f0c6c3f91044930c02dd4622d13d (encrypted)