# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8e45a9f11d8ef6ac348bac258b97668f46b5e7c8b6b6ca74abeb3a4323b9f42b
Pseudo Output
7c288ad5fe94c8cf866d9902805994299ac4a9565fa6a9cbb1af8cc4a48f4524
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2cd7a4cd24bca7858e9c3099f63703ff1f56f675c2fa33875cc1736408852b62
Commitment
12282cbc0fd2e5f5ee8ae64e3ebac76eac2d0f41fee53325e75b8e5cbd40dc28
Range Proof
672 bytes (Bulletproof)
Memo
103198f425e45020276b242c926d089810014624e06879bc0bcdad9c728680afc12f6dd8447fdfe8bfd6276830b9c6f4aabc218aee80723a8a85cf55674f64d267771cbf1c14fe80173c6494357de4764ca5dd72e114e3b0d33ef1e9950892de424963ae50bb53ddc7a15510428bc5a92203df400e602b0b1def227777d9a0bd (encrypted)
Stealth Address
18bb61e0b3abfc14c61a1ff48b89edce59ed0a3a12f67452b18ab1b697ec0c60
Commitment
949d60ba5e97071bbbda22267d939f935f68baf142486506a83ab2954b4fb431
Range Proof
672 bytes (Bulletproof)
Memo
98bf09375225a2cadf76003b3f2162fde607921ed06eb33c146c2e393db54126e49e1e99d0ab1d7169fb6a300d983601cb7cc4487289dcce0e4cb7a77369de4c36ea755e20e330b47d01a0c7846c4e6a120dcd190b21278756e8dabed2c3c74bd05503b5dfc677a571634129d62b596c369a0babfaae6cc9cbf9368f099a17dd (encrypted)
Stealth Address
28853361d081589ee70ae3a116c8fc516a73a527aad173e9976e474d1a4c677b
Commitment
d4603b8c24f52b4cf5eb8f23288e848e79144dc1391b43f00543f61dfd1ede6d
Range Proof
672 bytes (Bulletproof)
Memo
0c66772aba2414afc436ce1803b526ba8ff6490a78087f71cfc50bd4d3d2f35f22d20ddf30448dc6f7d86ab708a409c7e4855654d3ef4efb1d2f67cff24c7039235420d22bc5c241a1358211ef1be1b6a5c6e7252c8882a3b5aaea8747b9d28493007fb8cb72f88512eccdd5af302aa698d808343da90e0a25e71460c4712f5f (encrypted)