# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
92fffb9c61504e0fa7f2b898430d1d020f694867a605e7feb2393a6d67c51c54
Pseudo Output
288e868d7f2ddb431ea6d25937b0fad988c47311a7cea59ec56f379fb5652a2f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
22d9f84b28508f5f9c50c9a394448d239329d1840daf8b70912fcd52ecc4eb44
Commitment
c62574357ad87d0e5d73f633b89907c62c86685f2b99a1362c4bea8e3bf58841
Range Proof
672 bytes (Bulletproof)
Memo
45b251a34260e1d031f8168b2717c68994518b4a23e2034c6a7cb23940cbb90aad51d85e6b79f0d1de5cc6c7e550ab78004b9de318099149901633e4237ee0b88a56c6f993d20cf4bd968c9a2fc33d79edae669cf214f3192f7ec5e4403d56ad0b534ccb9fcebc3cf67eb19a3d7c87d1744cceaede3ff583207cf4fc864d80c5 (encrypted)
Stealth Address
fa4b2a090ae1afdd1b05a5f8253e91a62398764e8249e399c31ac5d074dbda1c
Commitment
c0e7421f19c8981364f168b12899b38268b0dc8a169713e3fda334f9ff252a00
Range Proof
672 bytes (Bulletproof)
Memo
de650ac81c1db49fc2f0a4bfc5cd81a21d6f0256f47c538cc71cf52be09838a4dbfc9f3eef15cb09289422ffb49120d203e465046e8dda196672e2cfb2f68134a12c75034c75a76b8770beea4feba912d74df83b0a598940e0051eccf9c42604352cc0673e3a5435bb07eca6f84e385fae88066641897c12502a48ca96d53b8b (encrypted)
Stealth Address
6e4267f2ae9c7928a0435aa063fb5f5b62532664c90daf60385f45e983179849
Commitment
62d6b73caa5697125fb08a9a0d705ecce2a94739e4d827667d0a2aa124e5aa33
Range Proof
672 bytes (Bulletproof)
Memo
a242b940691b438b0645a3d3ecf464dcf32075ba1b7fca25fe9045ac4e5b3f4854d582eb0d2119a331a6bec1eed13bee41f447c4baa44ed4bf0a47092942e3fd3b93c15b2e65dc97c01535252e56efa05a30c6f6d5a222690524a3a9747ace17a3f9f0154e0dc73b934d1bb755259a89db6413eb19a1bedf08c9d01b46f142b6 (encrypted)