# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
92c43c52c9b1d055cf31461406ddc0dced782535c54dbb88b1fcca74de1e5128
Pseudo Output
f8fbf8a12f024fd2e1185fab59aacc980d37ecdc7d94e5b1ca240df511f3613a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
627c4b0bc4e95e84cc7c936cefd35684929e76fc24ccd49381c383e8b570b26f
Commitment
9ef8f27de521a8e83bb4851fbb8c6a0eae2bccce064e5c561710c3f7bbb3fb7d
Range Proof
672 bytes (Bulletproof)
Memo
03f2cccf84a7071aff6fa67841d7848c7c9835f7dc4717432a857ae78df20cd56fc91966670a15e9b9d963806fbcc20cdae9c7610658b37fb650e5abd48154bfa4d90641a25a496d051550ab81d28964c5825a3cadc154686c6201c91f6821c561518a80052d03b0f066db00892ae5ee7901114efbbe2a38c67f7c400ba1276f (encrypted)
Stealth Address
30e4fe50d78c9ef383364a813803dcdec662330520f039cb198eeffced51bd36
Commitment
04923147c4d002f79f7f37ef60046d040952be547906332bbd0da5730c4e3707
Range Proof
672 bytes (Bulletproof)
Memo
0c5adc6a614ce8952d67cc4a82a739f7b24a3d551d3b02e015a42e7b65169afe6762c631c83d4a7b8f0bbff42f5ced9f49aaf51b9dea235891740f7ad2b995346b12cc4ff1b89e9f1a689d882f911fb3d760b8a5c9e5bab61457e32eb38a181d4025a637718268c596880fe8b56bf5bb4583b1131b20cd1d3a20d84f07fce726 (encrypted)
Stealth Address
1e53e762ac840885f329a2398d07d5bfc013d77952aacafe6aa4b5a7e2d07b13
Commitment
9acdf00928a2dbb10e5de082fe3c2a6bb751727e0972be4d8986fff898cdb727
Range Proof
672 bytes (Bulletproof)
Memo
4470a7f2c5cf82b7cd1edac99cbc7404d81694d92aebd88a3e1d834e1e6593e91f99adc7ceadc2cc983a2ed7272e59b86727df4e2c8128ac30ae35c4a5a9e924e21eec438e967ac1f0ccd30ff7f75d3fa0bbda317311c156e4643d50e96703536a8392517f56dad54e4614fb88f4d8e22dff62f6bdfcbbaf13babe2e76305c41 (encrypted)