# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6eacdf0322b83def8c2369996861665990c19f13e54415805836f694d9dcaf24
Pseudo Output
b080c773ce038d87a524a36160627a83614a25aca2535c03854682c8bfddff42
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d6427589a18b2a5c42773f213c6b4b047bc75d93c67d9965e3483853c963976d
Commitment
3867354074bbf0726c40da453886ba1301cdd04dea793562cc46f4a1f5d86165
Range Proof
672 bytes (Bulletproof)
Memo
aa8909e5b5fc2d6b7a156affe6fbf81658580bb7362f2b893b7a3682374a40509ee5fbfee830a11afa1e6f7b40ca8313418112cd30486841f47cb5ce17b0f47c315548d7bc341a0f7707b8a63cdc52774cda098874c0c4464128d691b0d9545f2829e16ed7f2c89a98aacd6e377eafeacb49c33eb977716710f034bddc7b89b6 (encrypted)
Stealth Address
4a1c5b0d6822e5e18bfd947454a3a22b19508eafe1d17e583af55ed3d123723a
Commitment
d473d24bb60a6c90e372e9c50e2a87270bd0368f3757aaa257ad3197dd9a6516
Range Proof
672 bytes (Bulletproof)
Memo
b6ff9d20d689d06699189876fbe4cd750117fbec804487f917488841da928aa8426942c5ef498324db1c37b73a283ea789abdc269c72a061b401879fde0f6ca2638b3c2cdf14d4cca462f692d175aae7d17a629c19f2d7b3c9094d2c8a37e4e8acefbd7b9af10e4bb72990e922754e973b6e9dd371aea520aaa62bc64db31712 (encrypted)
Stealth Address
1c28785927f78f933606037c3588987f0d82b2ac01b67cde7b4509a63c828918
Commitment
40e0023612c58911ed34d869ffd620df50c75ac4fe983bb8887ca6256b37f046
Range Proof
672 bytes (Bulletproof)
Memo
c88f3e596b4cdc8247d6ff290889c89b6354959fd8d0cf7fcb5993bac945c29a7e063aa0a7b4ba84f41775fcd4d93d77804ba8bdaf73314c8b357e290ab82e1b9d0e00d464870c631b810f896dfc34c0f9162028bc38bd8c42f0240775fa068b75afe2c0bf2c23e5d737b98f4b98dfe4b036eb33f727dac32412cfeb35ba8f80 (encrypted)