# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
947e415925324c5a6c9b1a65e79ba05d81b3babe56c977ae1d979dcc58266b5a
Pseudo Output
62666c28585c9ba0f4cd75d9ae4ee52b5c2b333afe9d1b3fcfcb2f6f578eb479
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4cf951483b7922e65ffd5e4534bf6772f7dcb8ff8c5d58057b09475694ee6227
Commitment
d468f3903e3aba7720053672ea2e5326f4840d7e130e70e962964c30596a483f
Range Proof
672 bytes (Bulletproof)
Memo
c57d14c4f5ef8ae64754fba19bcd3db32725c57742e3f426c338bc8791da0e443eb0a687a8d574777b4e578ef6ad6508a39ade19fedc227c7aeadb2a0046ca0b82648c64155971609543d961e529babaf3361fe9bd71e253fea5a3bddc814b70252ae00a7f5ac956c42b4c2928c9e1553328bd569eda06121a699f3acad1df95 (encrypted)
Stealth Address
bc9faaacca62fe157bb84c64702b878a45840cf7d6c4cac0754278e35b195812
Commitment
b8aa27cd08cc02f7a9a30d7c86ea1bf2dc7b9d9012ca2e0850096f6b23aebb59
Range Proof
672 bytes (Bulletproof)
Memo
9fc3f1f2ca6d83da8237911c3c958b841e1f3e5220cb51b51799cd04c9a6e3636020ece5dd0440ccfefadb861b7282af4167d19356696e1583e4fe36a6e9032bbfcaec1c77a285cea638eb51b27ea45499d5efe5e1cd4ddac3d3f6e29424505569414e0455cb13df4b977a8dcf25cc95f9330f6d556b30a4308637c74e834e0e (encrypted)
Stealth Address
6485f13d9caf20a16d4525b58720deda932a8194f20583905a09f7aa41ee1e1d
Commitment
9c82a54aaab561779d79a8f0897f360a66ba454499d9c2324888883c088f6b58
Range Proof
672 bytes (Bulletproof)
Memo
c51f1ff67b739afe4b7df9a80a0b5177ad2a26dcd96a601ef83bea1bf7fbc905be31f61d2957ae6abdb85897f51b67c96fb9bdbb11b079f638fc1ac3fe957b95198fd26f6e0a7481125886712d539acb6359b9cce251759d778c5e7727b9e1a43e3d3a8164ee9916429e13f6030c3a8a54a674d1c7d020f9ff5995d5ba8bb7d7 (encrypted)