# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
468760a0882b41bc6ea1d1e3371c207b579c54ef7d68f670e0c1a56264665776
Pseudo Output
f43b6feacdd2537d44308d8c945ca4e90e96cd605257982b63e83c5c9e2fcb55
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
18020d14ef9e5642ee6a340ffbb14abfd6a685c48c4e18cef53a2fbf96273c3b
Commitment
bc9e3267b4537c2ab9c6ca89e46993cb7a0bb0e2881411602dbfe41419655812
Range Proof
672 bytes (Bulletproof)
Memo
b653a3b9f21a8357b12865e9b0e1a8fb1a5f1dd40785e099c7083bf8024860de84c65c5f08df7626f06d7258530d7f426ad4b444508fa963468c058bc28d48d2a34eb8c7466d48af79e3030752147397cdf48f98caa3e3f168e783cba8cb8dbba961dd7648405d43c1c66559bccc1c67fa1d42ac84f00b09ebb883ed227d92be (encrypted)
Stealth Address
e8666f841c786d317428b9b6e4d4b2698cc7845131514b52e40d712580e95c31
Commitment
c480cd3acf997148d490d3477eaa7d16fa2b683a4e0756977d983d16cfd37448
Range Proof
672 bytes (Bulletproof)
Memo
26efa5e29a5706efdf51ba57b092e093a45f82cd7251bc4313adcef4e1f03a0679d14e1c7b003dfb848e8d769683e8b5c091db6f80fe7bba17d8e05a99846201654100898eadedc21a44990eabcb30482b1e7ecc7a4bd6299744649d5a179fb3830f4b38e5db41fb66aec4a94d738761361b020414dd81ce1fd0861437ec98ef (encrypted)
Stealth Address
ca26af2fa85d324e910e8c695889c0e9848848ed24758f1c08e395cd49d07621
Commitment
d0e0577772ca05f81f4c274f6f18fbe002763f27561eadf2eb8455d8fc388623
Range Proof
672 bytes (Bulletproof)
Memo
37541f94b88af8f1ef40914bfd84fe1cbf505a97683484d63aab5121ae5c3f26243d9674cec4a6aee8b9933d65a547e8060d82fbd70713140134b585d0615e15d1b31795d37c9c54342d6b4b1ca429b6c8c01446375d6c5807fba3d740a6855487f2c7c86a77a0475135a2d2e614618fadd31f6abcb8584f99fe304dfb5c6a5b (encrypted)