# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f6f7e6b606ffbba36fdb223e14db6655bbbf12cf2550fd92a9fd2807ac56b359
Pseudo Output
aef561864c9f1eae17fc485cd1426d1720bb13bc23a3e9124b22427b1c66a913
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
222817689e9e40deccb6071cc93b90510d967bb2fa838067f3d8a31684ef8668
Commitment
8028f9843b739cd34b67cf3e2518776fa12edd9d1d06ee5541baa26ca388d609
Range Proof
672 bytes (Bulletproof)
Memo
b69a8e12485b0bb463ab50f821567f8ec2be40c0244a2a3120ffd6896b8aed645671a976a8a85a0cd0daedfccbf5153aba97e982f63bddb88714a8a8b203f9074ac3b5f6c84ba8aba6e84a27f10b59b4a30261ecacf2c6066b9b0a1a5e190b468033bbd24cb35bd90178e8060cc0eccaa31dc1d4eb723b77a909f457cdcf0d4b (encrypted)
Stealth Address
8aee844da7c297ab1d321e0fb6f59eade53f00748022a69598957ca542a75617
Commitment
b4464e13e1a406f06710d31d72cfd7e4eb41cfe5c2782633188aaf3acdb66032
Range Proof
672 bytes (Bulletproof)
Memo
c7359454df833ddb020d6f8d780e563e6fc4a1c29292f52751f94dda2a95a5ea4f8b6cc7e56c91ed65b3318d6ec241718f6887b688fcf77a31d18d1f512279ff87f9a942caeba447b5522e95f24b79492227bb887ef22e10413efda42606aaaa71229adb7581f9f5ea52e980bb079728d596adeb2c867a90734bdddbfaedd2e7 (encrypted)
Stealth Address
6a1976bf764f4414db01ed13c2dcb3ac484fcb21a29e56f43da29a3a9c4bad34
Commitment
167f6ebf4a557cf30666749f951b0f1475d168f9c2b76daa20a2fe78f572c35f
Range Proof
672 bytes (Bulletproof)
Memo
104e4981c95c6d408206b7c9d07efd201f3aeccfe6d90b685c574855f9f0853f2b72feadb194681261845508d403cbc16972cb86bfa8d726be1544e8d866e4345fabd86278bcd1948b9554bd16426bbc8e6edaf93484140ed5c3a6c0ed8af78dc601e1f058fd322a50ec60bb4505742af57678a1e36f76e442224c9f7042ec9e (encrypted)