# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
32a6ff222cd31b4ae435ee7a9ce1d07b639d2c8d20daa349532f1360aafe897e
Pseudo Output
b6e92b115036fb89da8da4133c61123dfc18485d04a708e1bf8edf45724bae61
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
844bc1e8cefd25d2508c8b2f3fae7e3e3c060a9eb74a69549a0ce1fd60527114
Commitment
225a498068ed422fe67a6efcd2370de4bfff76a43deae2ccc82bc41e6a784c58
Range Proof
672 bytes (Bulletproof)
Memo
fed308515f8bcb2ad6afaa8e9f022f2c8d4d4e36a4d7584fe39681ed723b7f5d842b9a9a58daf34d80ed0652dcd67406d51026534d0d190fcbb6aa2afdd127fb5365cb13b07541d950ce0ad4bb1bbc63eb429322aedc24a3c724551ce94ca5e7b2b2a51f3856959d44280e0a607fa50132cdc599ecac854c618a7e3c736e8994 (encrypted)
Stealth Address
44414fac13baebe2090e37639709c15987b80ec8ecc9932330ba7c87beb1302a
Commitment
dab4cec33b9c29f13e04b520d7d910e0a4b9436b76f172ed9382001da88f5b0f
Range Proof
672 bytes (Bulletproof)
Memo
c91ac5e286d6b17609f098c8e8ec3a41f63a944b4a1e842843adcc92c3fb04fc378689a161b4dd063a2c2cb025a0440b02a0a8e02493c1b3913849b342e9e29abf64174654c2c43a37e8ee856d8930df3faa27eb6a81f6f56dd9c49087f7f679b432529e0e623314546ab467d7f903fc12f0e7d5f4200bc48f671e2b4a5e8cf7 (encrypted)
Stealth Address
44ccc4d76cfbfb4940d433a9fb01d52a2d90bc51107fbba17b82cd882f521055
Commitment
f60c2ab86a98277d7b1ab4e5819bf7c2e4220526a5b62d47da4a8d95afa5a011
Range Proof
672 bytes (Bulletproof)
Memo
1dbd24cb80d8ce0b6a056dc328e182a44743ffde4615b3e0c298f2b09c9d527759780aceef227f4f2ae1fcffd385598f47fb5bb4fc9c5e005561c4455d79fb8b179ccc2665cbbbe4acfc9e21464b1d170ef1c223965ede6d80fef871a52185b26707e927e7bc0c843e341b075443e3d99f57ea885db481152e73edd71d9d5cc8 (encrypted)