# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
902678a71cbeb1791ab0556541e4bcf8c651e7952e2d841995668dd3a6a8d222
Pseudo Output
a28b0905c0452624d3faab1bfe50105ac688629670d6461f25acd6cfb377aa7b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5e816703bd0167d34bc3c9b23e3f188445dac9faf9cee002b5e087c81635563a
Commitment
0a7e4f2a15646ebb51bd23f777549578ab188f863356efead95b36c212390e2f
Range Proof
672 bytes (Bulletproof)
Memo
e6baf1420b932c56be580ecdb1751e48eb182d2e755cdff564440e78e52a656e2e4b2d00a69da4c1f3b6908fe9d6dc6417e35be1ef554f8531c534bf1462a32739579482b1a8017348af37e3401eda69afd78958dea7fb22f7972b782df629336aee93c2a22a576278d51f0c4c8f1d92edfd8b4f05f2765ef9e29a915ed48ce3 (encrypted)
Stealth Address
281de26a0a4d42fcde0264db3d9509a65afca6fc0f2dfea75f2706d88949c36d
Commitment
54be45da7101bef81287570ff2afe2c929c0441a8c9cfd59c5953092ff82a237
Range Proof
672 bytes (Bulletproof)
Memo
f9110dad89c6b24266a9c019bf38fd83d78e6090a4b3c446abf40c1f15eca488926d053658d0b0899e9b244c959869c85c7dabf83a054b50053725a7bbdf502fba67e32ede2b8e043ee2f8b79aa611524e5464e7a46683bb3071b24d53a1d97bdb4a4567e2c7368d071ac524e585474d3827dbb28913245bf0e65f48ed3daa9d (encrypted)
Stealth Address
1432a64bcb70862c793005d947ea73b3567772661bcf0a103e61e4c8f3c74b6b
Commitment
5c58cb276a00d46812115ed53918f35a310ea885be8b1ddc031ad51eacb15d35
Range Proof
672 bytes (Bulletproof)
Memo
f929982ef4298ce5a653bb131dcb0b65042daebf2602da32ce8e40404bee98261fd5506fb88d6cac2df55afe731b095bdc0e2b54f79fd55efbf5c0097af8a01d71f0a0a3f1c090efc7f61b8f53cafd5a92d5dfe84865367d9a5df1c2cac62667c9ec16d0011624e2f769462dfee388c7356078465555ba5f90a7d6328e2e0a4d (encrypted)