# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
228cb71f79d81feee48570c65ca5bd2b3ed348da9cd325081635d8a757063644
Pseudo Output
ea60606bfa2eef132af50163b1619cef8cca37ba194df26e55b291d91d28fa7a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
70eacf59c185af4d29c569b8b5c4a484d8083308c653a04d01b3da08aaba886f
Commitment
30e9b7aa90f094d916aa38c6061a8605787655969f8771d14eeee4cb1e52bb30
Range Proof
672 bytes (Bulletproof)
Memo
d7054785c3884d9eda028d84b7cecb3e6cb966036aa765405c47e13c8653e7ee9a756b0fe4e8129ee1899a80396c33ab44c17b5265ff75addb8873078e98a2f563e31eb65398b5bdc7e75153d2f2547e1186ca04e87bfded8fab3bb2e64939d73c11e57eff46dd7d19e4ea07c85a7a65b2f54a2650a2ad0d247b62e45b5d40ed (encrypted)
Stealth Address
a4c66750c0298db91c5973f41fdbb99eb0d65d5e2371fca9552598d8c6aa7811
Commitment
08084423834b94e85fac071ca5333daa4b9606adef0a4b48f413372eaa52c119
Range Proof
672 bytes (Bulletproof)
Memo
73c0c087d3cd5f944634915e7091448338ce0ba566693092f21f30a2183a1a55be83fd3853f7b469c60f741ba1bce7df6a7d7e8b623f8f388f8fed07cf627a76f0141d23b22682cb56d72e9231927a1eef655788161590a454c78dae36d0eb51938cb658ac407ce72012bf5cd0710a13a7af490f548a85b02507dd3eacb822b4 (encrypted)
Stealth Address
3c796a9237c4fb1fd1f3601c6057d3c52a29b86ae65cc99306cec897cb362028
Commitment
40d5fe4016b6a9693795fc14f18fa08e3418c7f18099fae0af524c7c542d170e
Range Proof
672 bytes (Bulletproof)
Memo
bf35d93e56f3f183b952a5ceeb53ef5f15a79f2e18caf39fba8bb13b0385320cad12ed8b307b7286b42c7009ca03fc0c00c133b44c1ed885b191276cfc608dbcce3ff33c0a4bec0867bd9b1dedfbcb65173be0f50cd2283948e58b632d79229b42cd82fdb218d5bcd2590e938c6b0252b757566190f0a551db10032d51ddb4bd (encrypted)