# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
427af85862ffae4ea4be21362be7382a1726688730952d1a29d17195e6c82672
Pseudo Output
fc3165b680456b1b087ec3093a756e9e8fa13aff9821b1d0b8a32bc5b093bc5b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
24c345f6afb6d446a4ae0481605902587ddfa4d0c1f8464b0d969605f607671f
Commitment
9af17911318b6f8a699d3e56a01f375b96751a43c29c469ff43edba904c51e06
Range Proof
672 bytes (Bulletproof)
Memo
c7aaddab041cedc487d7c999c8fc5deb175ce8a541206e77a9228139c717921a7914f426f4988418c9df97027139310cba02014654b6fd14c8712fab748fb3b8dc1376b0565d9de1057a822c321ccc8235b598981fc126a7dacd3982487c0003e5bb10d1882651fa1f06344c6a7c3f6d6be891961e92fed6b448917f3ffb5a4d (encrypted)
Stealth Address
3a2ae7dc36b4183c291b3173dcc6951d887715d7197349cb2f69b13c3c66a921
Commitment
c6b5be51b6653404e1aa7d105ff6a3e54a8a8fc96105dd759f49c9530830011e
Range Proof
672 bytes (Bulletproof)
Memo
c83c3aeec4890ee36382a9949329651bbabaf1b43e4769ccec8d403498532da7b653e42f4b36038fdb394da61499dbbf00e6ebfd9a1ce344f61855e035fdbc02b7ce0965b9ba14253e7fe5e36a067f9617e3aa7c254859ca532d7db1fca61db97ea8108a88297c5660a2a8f24c7d950148ebdbd894040fc089f229c3d6eadd75 (encrypted)
Stealth Address
2e45d17ebbc107070d87cefcba095f8c70b362d9f9e30f702b25929302b93f27
Commitment
ce644fcdae86cd57fc171658ac15b15cca065608d24663c20a5710c5035c6844
Range Proof
672 bytes (Bulletproof)
Memo
3001450b5723ae8668c47cd365962715804524b40b06efba50b0bb69c90f094e17f726d13ea491811aaaeefef1a3884107c6bcee0b85e79fa91883d4ad9b596b3e41e1cdb36ce9927510a5edf667cc24b54fd3349b0185cdf0bcf63d0e7062fb3f0e072e50b603dd4f2e5f353a544ab1f3b971729c31e70abd2c0dca3d49813a (encrypted)