# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9e85732355c6ef61889829ead673335a1167f2d4c46aa1d3addd8ba634b5cc2f
Pseudo Output
c8c6f43dc10bcadd952bacc8b3f2de8394b27381c27061b85b6c4301d75a2346
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b24fd8f4743a3663b41fc57ddec1a00df7bb0928f5b0520e11e13b04f38f9164
Commitment
3a4582831d5786299e883098502e9c942c32d6406463fa5108f7505b2424dc77
Range Proof
672 bytes (Bulletproof)
Memo
e7e822a068d053ce5c81753286320e92dcb522ba4a4390d653d829721bf51683c2f490e6996db3e3e10ba92079d959893d946a3059308c3752195c16cc9e3f3c7b544ca02f94a184a17296aa55672a2e9d7ce6eb52f9be86cf3fa987c2c6fa2773b6a666452cb43fe7bd9e22067c48d504b3acde93eb4240aab2b9b1c635c2a5 (encrypted)
Stealth Address
7a4a1516b0f34cf57ef1324a1dc89b1ce3eb9e99fab87c0f54b027ea5ec6a642
Commitment
7ab64e15d6707a51a45f28693ffbd1e04c5842d952723aa04326e46170aa9d29
Range Proof
672 bytes (Bulletproof)
Memo
baaaa3bebed0021cc2704c40e5b4dd5a6c58c92ac9ec4c049476474ae0293b6895b02f15f24843e6609a1caccceccffa64000cf08cbf88bdbe7f23e5b0ff2ad08950091006d1314de5d243d5c6e766d2be79b05428381c9a459ea02ffc595571946897c289983ce2c61e08ca2390048221429aee0ab0a5424f74b7a81e17f9b9 (encrypted)
Stealth Address
0228d207522b7b69c6776a274f5b7b3fd3f6acfbe3b2ff1ff33ee7e03dea8a4b
Commitment
000c977f95cc35a726da6daf1b46f686e8c1770b6c83486f3ea58176fd124110
Range Proof
672 bytes (Bulletproof)
Memo
5f69bd736d13b19733791170b4eed62d1354d7325d2a545d284c7e38ca99324bbcfbbd431eea450dbe5b304ab22c58e9026335a37d93693df2bb210987b5054ce09bad978d24791d02960fc3012c9b03edcc44a7db4d9a0fff12d223ebf627696ce25c23eb04cb1e9f43e9444153aaba92784a03e5caf015818b646f26161b3d (encrypted)