# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
622895cd55f35011dd71183c364a2233055a883a70ec615b9625c722cebfb826
Pseudo Output
ea71fae74e9567d0090dd4b1e2957fc7fdec15ce34e218a41d90e4f9b707a32b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d032ee1aa3855cc10d0047a709d8b6a5b1ce42e875098bd36e9c1330c04e2c2a
Commitment
44fdecc16b243b72709cc367a6e5075b9395e46b3e032e98af34838f9dd87634
Range Proof
672 bytes (Bulletproof)
Memo
75e8b7cfe0b162d2753e74c1fe4ab42ec6f386f1dbda557ffbff5988024119cb02c022b90c4ee988cd6265242ef24fdea1c982bd293fc8184a696f002b64f37bf7fa58a6c4585359a0e1fb133630c20468f54f18f379e2a3b55248cfef7e12aff894c4765f2f902844bc2b4753d36513820dcc4932c3d8b052eef88523ad447e (encrypted)
Stealth Address
4cc4a9e287618fc7ccd39c8a3f43a596731b38eefecc232cd7cd2ed451325d5b
Commitment
989188757c81a9d7829246191e8ff9a34ad4541ace8e57338c280fa5d77b8e52
Range Proof
672 bytes (Bulletproof)
Memo
9ffe62d03037973d17b3f7c34e2b7803d97b4a00e6c8288024ab2c8ff431c420b1d404b5e5c713e82f07ab3e000aef11a61a9a00c8d96f191a0685531a9fc633f804536d371edf7c9412350e2b463ecfdeb9928decab6c65247e05dc0051d8a7bd7e932154c0f0b3ff364f8c09667e8dab6a9433e78392803d0d65f3930d357d (encrypted)
Stealth Address
101289a65cada5e54d1b63d0356158bf039d254903ec876b52cd738aa0b0f034
Commitment
7058b2b5bf7b503f3ffc34e8c0d342e1369677809420b208404f8186699d6d29
Range Proof
672 bytes (Bulletproof)
Memo
06358a66410bc51a8e97e4f80ed9b13c32e068ef23c96fdea6a9b1ea3a1dd8902743316f004ebf0fe5ff234bd34556c164d08c20b9f1dc8c294e788c710d4e4b146903902d4e353b0ed416690f566036b40489b8f4c8969a534a6b82706adf6eca5da71608b6f5e1dfe6fc08f85e60cd920f8e972a75115fac250c020ba54aaf (encrypted)