# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
90a96f0455575c29ae8afba915b848e49ae2a7b6fcdafa10fec8289a83234f0e
Pseudo Output
6080d04ff79dda2d7a180384a576525ce612691691d9b7d2e30e05815af98d3f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c21d54bce69051ad38860fd0a87bb6ac270ef95d4b8c0462f30a5af920f5f57a
Commitment
2c7f82cdd4629ab26f9fecc09fa6c1ded1e8f6ef00f8eda4f2f87f7226a3e82d
Range Proof
672 bytes (Bulletproof)
Memo
23c09596d838b5c384f7001a218713e46c12568f7ec091bcc77a0bf692bdcfa7d17f87f215cf60ead981e756d46e1642e9f98255534471bc11b776bd01adcaa1f0264d94bd4ba2e17df7062f5f4d1e01c2ba15df44de348168a5576c7fdf79755a43011a19e6061df382e2c628b4cd29c4f4d6ce23574971b16e571f174753d7 (encrypted)
Stealth Address
3afe3bd359c12be67d08f307093e5abe5b7a855c01b08e4c46b3fd02ba9c286f
Commitment
a47b4b55601f3ddfcdf0afcbffbeaaaadc02ac3a14daf6583f8dca4e0560b576
Range Proof
672 bytes (Bulletproof)
Memo
8ec00702bf4503ea25d2145c9912ea5c80e57811ec06fdd3be331e221c753b4b497db8ea1ea42067964863c3b55cd6155aba21346b6400cca892d7fd2352c8cbc74a4fd749c7c19fa87a0c6aa29ad0da62eb95d9d719a318ec5024e26da54ae6a5a9dbd52fe66d4609f11029fd748c790fa37d54a7084721b92370e403907f1c (encrypted)
Stealth Address
c6c3b66c1614bf4c7c8a918f670137a0db237e164e1e2b43ec6bd876aae9462f
Commitment
624bf641fcb0ee4ff0e86a507a16b69a64fb6bf2efef6160c5179b0851d28b74
Range Proof
672 bytes (Bulletproof)
Memo
b5e6d5ca7c9faf24524332dd3163a3d9fa3d4e019d2e61266b7a198193b86f815954ee104574fd82791e337769ab6a74cdad16a54d60a862c495eb76ec55b3386a60c3bfd5913e1f3dec755ff49892bf3bd9dc367ab5543d2084e14da1cf45b1bcd00557bc261572124c2b5f8525a85007365d29c1ac64fdc3773b3e13311951 (encrypted)