# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
220173f53d6d746832d991473c7dd57213f817688714289810498d4dfaa4c248
Pseudo Output
5c85ce522eb743952283d8551f0b615eb76a83a13b9be65bfc80d1edb89d2861
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1ecd4e08cce1b58914c8e57a5628c4227c2bc83d6e5dc2dc71a7738c78a1af4a
Commitment
6c590eb52c5b7834fb081b6db4688ca1ce92412bb7222b72dcaedc3f54ade736
Range Proof
672 bytes (Bulletproof)
Memo
4448e361f6277149313066114651f73da9425f34273e3c6673d422e85861d714c151542cd7ee4a6e7b94052b35490c94ff41a72fe55f3e82745d5ea60b599cdc4b8e918bd1e47593aca760177c6c051d2163a44c4cd538e886ea0e1b4097bf5d4227f9d5900e76c056d3e22e2bc8e8051bdc6a05290dce07471ea16ee74363ba (encrypted)
Stealth Address
34406559fe80723ab73b1f6895968a808bbaba8af84da704b7d508f1b5568564
Commitment
34a8c4a2f89773ce0ff7eb5f940e4d45dc82950ba582255a5e1ad7555fd52b63
Range Proof
672 bytes (Bulletproof)
Memo
959f7bf5e924b7dc07ba61e6e914d6b2d2707138a309e98c154a562646b8112f1f07ab3b164461d32877cafe11771339be84fa532d75c1058fa35af7928c9db7709da1a901203bfb8dbcf7fecaa67e69cf095d2d6a45d9fdbb242f5f327f5888303364155e708e0b02872c334385d53e884fe15b308388fc998a7ff88db8137f (encrypted)