# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
32ad29511dd80768948986c11de738197a7956ec14d723a262e12c9404aa5c54
Pseudo Output
5473f07cab9654483e83ccb8de8f8d84cd521403fa003028c71c150b8ed3b21c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2225314ff93a41989163a6d22c647770f9e65fbc9b2a8fda350e3ce8177b6a6b
Commitment
acde7d4118a04ff86e32fb0d773e72bf8d876735e0bb457acac5d1da9553de13
Range Proof
672 bytes (Bulletproof)
Memo
4145183946480ecfb5625d1ba7859435ff5708a0ff636bde6e6abad2320db8d4eb85a4c273cb3e37a0d515555ffc85bd3166db527462c653e3e71b0afd92e3749cb25d61dca667d81836c1772de5418894cd5554d5bf64575cc6f13b2f9a89548983e0c1824cea5f9a2e372c461465be2ce66a6da999c71a859a7298779ea92d (encrypted)
Stealth Address
70630beb4b301621fa4bc86e98179ccf6f9c0f6b42d2aed570b13717578d4534
Commitment
848fc814cebe1e006cee1d08fbf6acbcf001ff24e790298af1cf8b17c456285d
Range Proof
672 bytes (Bulletproof)
Memo
105349fc615be37645cc786c7e08fd1109390802ef4b2d49c72cdde9390deebb6ce96152988ae815df348b418ab0663cab3d6418fee51d96547e7b946a20dd745c3eaba5262bf034c74516dfa91154fa96068696b196f787b1de59bd9a8eb5d34751389ab20e505619fba0f7753c4d83a8d646b90030f5fd1bc62a2bc391211d (encrypted)
Stealth Address
ea8583e8f0cc2f49dfb9b4b2429b1c01f521524063bdefb7f757388610566d7d
Commitment
fce821dc99957a5f85cf6f59d9c81a2984a987fa828dbeab01c8e91b5e08a10b
Range Proof
672 bytes (Bulletproof)
Memo
4d330fb266c83d9adc18b58538bca2dc811ea7256c3cffe5bb672622d91aca9a2df9e42bf5e5604a29566daee515affd5b25ae737fc2cb6e0daeb05475ca42ce87501cdbab1ba9ec33c53bd12c6f5d059310bf855cbe3dbc9d4e66c39b1d8e857f4d6d3127ae42fd655d3753348bf83d4d2df34b2fd220b96b2fbce574e072b0 (encrypted)