# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e2c3a7eb9b29d4a355f7cb4f3c9144bdaff56ae3b13a99d5072fbcc4bc0abc40
Pseudo Output
f47e094a1220cc6de66e545fd91f89c7fbdafcb5f93c0949d077b9d663bf8005
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
18869c229a04a159a0c412f9f12d5ec23a177d68cedb0596ba9f3538d381b205
Commitment
78a8036c2f2d5b540101ba48869e5eef89e353e4972a5b19cb36df54b7b6cf63
Range Proof
672 bytes (Bulletproof)
Memo
727ec790f228d07037801a4126542622f8545bd96137712e7388ee346ae5278b632eef1a3bcfe04f385b0730b69d5996a9d827281fef583c3b0a3eec80b65ff290682deb1a5aa48cafc645cb3c5bdc938664f721b28df62291e2f372555a2d0cc90a80f8e22d8d967fcb62597dd68d4c0186acd6c71f66454dbcb83621c233e6 (encrypted)
Stealth Address
468e6cf174bf9712dd36b99a89c55a226a55e7265bd5ffbdd40eb22eba7a3267
Commitment
1c0a7622002e1add0b791778712ae9003f3c5b2d88d1c45757893696d4cee778
Range Proof
672 bytes (Bulletproof)
Memo
4682d920451e12bf8e9ce0aed2326eeb6c26d05594de05073ff559227f9e9109f1457c44c3e9011b3662703f19f5bba6688714515885c5bf2338ef0eefdc8f36076ab14c8f8277f651f5481269ffe88de452702442d0b69f660391ebac144199affeccb6197d6fcc9106a3fe72c6658fff775806ffd4e964447124d80a755943 (encrypted)
Stealth Address
d86867362caa56fb6c3299ca13e11afd87536d5ec7b0736178567e43a3892f76
Commitment
4cb9e11df768ccb988ef5c9f295e26a4fe04614daeaeac8e3e6886bef5cd981b
Range Proof
672 bytes (Bulletproof)
Memo
906bc953d1b63e8536691016f4503bc84f448a05177ddf1c3fff485d6b1b78d34c5c938f9ac96a24c92492a6bf69ba103884c3b16b55cbf39fbdffb25106cb32f2616421bb37ec0aaa57baa6352f16f1a10bdeeb61f2df44ad210b721e870182c0dc06db9b5bf50f997fee927ac16ab9524aa737c1264a8ab4d340b406159abd (encrypted)