# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d2f6bbd09efe10238760dfee88f2a3529a5d245dbc8aa5e0ed6a01bbb18d0d20
Pseudo Output
c492090124742d231da23728683682f0279064f8895427188e576962a838907b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
089f89d238d037fbe73e35adf80701acc1fad30df40fc7c7bb37c2a7cb703973
Commitment
38fe4f1829f6a758c8257506485ad7cc34cff5258180871d7616938829958745
Range Proof
672 bytes (Bulletproof)
Memo
012609e38e499fac01941bbd9daf215ad95a2c956a270d08caf82678004927ff5afbac6b069c2e4c06ba7dda3ea920b204091cc5de8148afcaa392d8aadbc78affff7c3bf508b85a5cac1323b939206a3b7d0b66d260927d7458474e35d790cd6f3941e6b1fd349f4064e05db4b3782577eb8953c0b290c07b75b85c334c426c (encrypted)
Stealth Address
4409e889dab4cf56bacec6b4507a80ea19651c0ec1108a7d21180cd296ba4949
Commitment
14cd277569fecd9efb1baad54d3f262087b6de3ce994aac6aeb326340dccd95c
Range Proof
672 bytes (Bulletproof)
Memo
9ebe2871cb844485c696afb7aa81d911c7379fcb20b458f7aa297be7c2f74a70386c25f1ec1b1ee483543d95bc47e6f5187769df93a5339e5faca032f1995c27deefdb9fd22246d0de306f6a871adfd63a5e641da68964339f130b4d5ae4a04cf605ecb05add2db835da9bb59b930ffb26c3bc86728b8d5fb38bb8b60ff97add (encrypted)
Stealth Address
94741a8a758b5d2759093208e21e78019ac99ef29df1d122b599aca4d87e9628
Commitment
5c1d63d01eb4d6d6c0fac5ec3779be27ce8a8bef258ffd8d58d78c0a3ff28211
Range Proof
672 bytes (Bulletproof)
Memo
dffa97f414c46710b4e248fec35bc86047e2516f98db7fd4ddf0be0cfb92a1ba1e0093939e1f99ff49e5861aa2c92d6874baecc7168ba9483f547976533d5cb375d4e163a82596a2924aec349748c92dd8ea4bef2cbde31e67729c4a3e1ee1c3cb5805fa95c34dc16c430cd45df6b5c5fc3ee9b602d73ddcdacf52163ffc8bd5 (encrypted)