# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9e8669812c7ed3d6c54176d5199b1739fed4fd6fb7178e64f45ee13f16893b62
Pseudo Output
288b9ca0d48efbaefc8c5bed3d9c27876c57039231b394140a8f41dbb1f2d349
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c6c8b78d40fa3ccb99e4b23ff30b13847e8d2849e5311117fd0e9a13602ba264
Commitment
a8ec0c9683d4d2b3b7318b5416b26fb3ef41115b51f8c066a42af0e045ec967d
Range Proof
672 bytes (Bulletproof)
Memo
df6be1c6a0b79d5bcfd8cc3dacd341a8b42e5ada156d76c40b2d410d51e1e533c21e788aaa770fd9fd79004a60677cda70985b240a7c087439b81bbe906f17e6d875e2e6b94d445cc565f5a27bb32c66102fded4d243deb03536500eabb11ffa52b6e5c883c7a128139ee563b4dfe638d7bcfdea452b5b7f2bb523f6ea0756cc (encrypted)
Stealth Address
dee6e4c6b84d0b68ddb2d83a227154040719e49fb572d40a9a1cd7c7230b2261
Commitment
2e427665b513215a9945154b2a73276289afafbe9d0c9067a92fda26e6575563
Range Proof
672 bytes (Bulletproof)
Memo
4f05e03c84b2b3d23f85e734ee550275d6aa67220ba88ddb1387c7d057459d1b6870b6addd1c90ce5471e161562bac77789be87a8d621f36ac549a3b9b9f998f9a1e6769c8b3c8eb8f994aa27bcb7922ef8f0709bb0eec14f406745a61cc2b2071a58fde381722755771fca47283c0b0e15695590acf44cff693a2eab53418d5 (encrypted)
Stealth Address
207e4ec4c2192003ecaf550ecca89b613b3ed7ae4af9d076ffb3415c8aaaeb24
Commitment
7076542028c0600c5dd2104b5666324b79be9418edc121d98313f8f999804564
Range Proof
672 bytes (Bulletproof)
Memo
4a6257bf435643fb25ed4ab6438f669997f91de779a9a86c710d2d7bfc7f0821e1fac19ec7af47196eac527c53242b3fc761b5ffee9b098a1b70f3fabceeda1debc62981c85c412ced0f51a6b6e9f7aa1377d9a9426f73c51905c0c0f9c7700709a418b514a03d08896ce8813c919ae43b1dbd3d34ed2ec151e5cd7a5393d886 (encrypted)