# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7a8c826ae972f90a81c17d16294a3b4f481429a54dd7bfbccabe573e0032a00e
Pseudo Output
566dfe51ee5d1523a9095c70fd85169b4c900fc1f4c91ea278221a621e335312
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a274f3b28eec41e8a5b3fd37db51282d092b23dd569fe6f93cd2ef8733182241
Commitment
2e2a84f79e9cf7fef6c757392f238ca20f43d62ed326baf19071e10b4dc8a56b
Range Proof
672 bytes (Bulletproof)
Memo
36e9b85b77b0b7628fd40be754cb87765795075da11320460e235eabda695692ef21bd3f0a58dd4204cc8122bcb89bdd79fb91c1670a0b24ec566da445d2c1e35d751c6058d3d4e11b36bb04bd34d4f4738b7ddbc0c20e33e5a9f24cdd8a7ab29417f36d007dc124684fda732d18b78fe937ab1abbb78f7bafc488c1355015da (encrypted)
Stealth Address
3c0bd046bf423ec407a7afc9641220eb6890faf9875cc56e330ba4ce3daeb30f
Commitment
549b5edc2cfa10c998845f18ba63e20eae8b1f10b2378c9f55f8b44ca1013240
Range Proof
672 bytes (Bulletproof)
Memo
dcefabf586ddeec83df4afae749e05e85871d88c38c2a46ffc57a89cb8d56512adc177fe966942636d098195f1a87ee85e1715f8d8460cd509ff635bd1101c3db0ad91e0f0fb18623f06bbb4376527a01405ef7129fd233b36b4cffa8434bb0c026dbe47c9508bf847047fdcd466b080deff29eb2bd01d661fe4ec0d03483537 (encrypted)
Stealth Address
da223c823c62dddae53197a048af19dd8ca5b697f42bd6b8884f4cf3c35d3d6e
Commitment
00da1095d711db1324a42dd9bfa1c9953f2d6d4d8e1eeb82e105f30ab7e3ae29
Range Proof
672 bytes (Bulletproof)
Memo
fedaea1393054153962a55538c1d5904a54d7630baa4fff9ff98b8a1e2e49fe63fdb355e0c568c0fba0810c5260268602978d13d4ae1df39aafda9212a4004e3363706d3b9811b8c15493a5ebc4223fcae86238870a4175c60174612d661b8e49246a7e077b50cc2cf69390a4a39865859d37f523cfc0156c435b79bde1f6039 (encrypted)