# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
184ec7a44a413ce040903398e11006046e5ce97cca95804596298fb20b09675c
Pseudo Output
dcafce771618aee8c875b869a49dfce0bf7811343e1c28eed5c940b91e244b20
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
22864f1d0836c0dd368bfade91cc86c3f0ac0e6312bd88612ec26c393ab16d22
Commitment
8e52ad9bcb566f5de5f3cb0fb26a78e641b54587c350aca978dab00689db7e12
Range Proof
672 bytes (Bulletproof)
Memo
03036c4254b191b580a4eac3c850d0c21730ee9458e106415536336b687a439161859aec031a6e03f87b3a015d045fe9a39ac937a91260b272f791fc35764ca0e8eb350c841e503df4aebf2de1f3dc4d4d3a59e1aca322b386718f4bd23916c37df89633019725bf585be100096e37fd6802a0b403bc2a34197f74d0bbd91982 (encrypted)
Stealth Address
001c1f6fd10239e69fa62ee70ca6d9d90a0cc7a242a18121bd0843df27a33c1b
Commitment
847101636019d4feaa80a7cf7727a66f9bee99fbf815fe523a9fce9d432bd409
Range Proof
672 bytes (Bulletproof)
Memo
a722d34605b83b1196103cfe1421f3e3533a2421e778cbcf5276fca99213791f97b4cb2a8b6bf9d9f6ff70c87c27e10b9c67e497899441ec704ea2e51028d0d9f00ad04c0173aebacb4c7068a0439d859088a0fd69f3383cec1b34c7d3a32190432553ee6762964e0990b4d8b7baca28489c7f2d93f32de5fbfc439e01b29e1c (encrypted)
Stealth Address
7c12f5f9f38c9f0ad32660ae086bfd639e1b72bc14b83e0aa91ae83368ef3a54
Commitment
52f85c7fc6888abe7c66ffddf0442d49e123bd9479df0f0cc2de69a4cecf9031
Range Proof
672 bytes (Bulletproof)
Memo
1ee8cb847a79b0ca2fec45c233c8ca0a3d888dc58bd88e34aac3e0bba39f6e041f4a2d844c92796029a6555af52ed48a4723ed3f633f07116853d00977aab70dbf48cbfe44b698b95cba9a4a4675f81ba60fab495d3ac4eb710599b069b20841159fab73903eb50b5851036074b6ba232cd36b3e39acb801e979d1650ac628d0 (encrypted)