# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9c0e6c1b31e286900bec82bd0ae38a738897d077691a19ec9f08f0e1140ed01d
Pseudo Output
5057b3608121f979452fa0fd7d689308cbc538dd81df326b073629274e7a826c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fac28c9df3427fee86cce4b6794c250ff3b5669f835289f1ac8a2f2ee8569260
Commitment
3a64f6dc2472aaf69dc305980c57e157d733f0457a702413fcb64633eac6756e
Range Proof
672 bytes (Bulletproof)
Memo
b68b1335c3bc9e9d89c3cbe99ee4e65d6aea7c4b0d8345527e9ddb863d5b738aa747eabad8262bb4ac8273f4c795a678a816f95b6d8cc9b43cb98d1002fd604de415044c0680575e54c2f4d14dd6c0bbb4f61b58a5a29e71cc54a7340dd820ef485d04e81483ce62d2cc9fb54509bb1e9712ee0b75c39c460ec7b3d3c887a5e0 (encrypted)
Stealth Address
9a0302378d09a08abc3937c5b0cdf0f881d715ee78cda92498e601385dcfbb77
Commitment
281238f7670f96f7f1b95c9044056d33b932136b0ea5aac59341ef434bb8bd6d
Range Proof
672 bytes (Bulletproof)
Memo
cb67360eee34c6b600c6761a67300dc36404fd0aec84e0b2eaa75af31aa858fbc91b3ceb8f7d44160d29b5d012452d490a7b0ab122ef6eb3972c8e8acdb32f5572cf12e6e778fdc21c57bba38c4fd85cc343cebeec22487ecc57673636821b1d60052319a86140eb8aa5c2bb77eee481a68b673b09318d568b47132c26528257 (encrypted)
Stealth Address
de079a2ae8fc6e9ab4ebf00a16726d872b3e0d0fce950580d08da0e9fe2a9a00
Commitment
1429291c5be6585bcf30b7323df5ca1ceb654c951c9cb1766bc2378924c7ac1c
Range Proof
672 bytes (Bulletproof)
Memo
b169b13227351c2a8f41aa73452f237815bdf78291c8ce2cba85bcfd9eef68d4ce74ce6be5dc74a6da437ae2956999c76f75e772ecced15d9fcf4d0cba2b3c63ad88b7a715e67f8e8faeca139622dac96202d13680e2a294a77817119fd1c52313e6fd2c7d24a63be22c0a4e904c8d297492d740f3993cb405030144d864b4a3 (encrypted)