# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
bc417b06072b25f6bf01488021f3066557a4f0fe652e9111920f140bd0771731
Pseudo Output
22ebd6239abd1d9bfd99c13efe1d2c1ca030fbe931ff913f36642e0e09a1a07f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a60b2e19ab701832385efacbe30d8e0f3cdd0fffdd4ac6e7f9896414b89c3d65
Commitment
705eb740c37180c80ac7cdc203aa20089bdef0bf3e940950ca9ff9b3e2e56929
Range Proof
672 bytes (Bulletproof)
Memo
48aaa3d8b7abb022476dd15599517427403063f9c1ef98d57d40b1c8a1735053420007873307a4858352acae40154b647df2e2917516ddf5623789b25b3d85e68d474b68208a2896a45a171d117be16aa605e177d0acfdd1e30c8b90fa76b13643a47701f0c7b4f09c18ba595cb19fb03845a1e16fef913aab0d5cd2f405bbdf (encrypted)
Stealth Address
7c2690d2a1605bfc7d14d432b7993327030e2ff44d3253dc9b3b23a66a7f7019
Commitment
3e7a4dfa9f4994bd6d00f8ff5fbab36561fc946faf960ddb17b167c447618d5e
Range Proof
672 bytes (Bulletproof)
Memo
dab1ceedd748eadaad4219a4d532e8fa9b3294c98c9cfb9442fe8a89f65b27b799799ebd686968acb29c46e372b14d03cc2d603e6a955c73725a5da0fca2772508cfc3eb3f538415706a7d3d4366432cd189a62afe0a73467b5ccb2c1c535c47f23d7c0b699e25aa183dd51fae4d4e8e2bcb2dd47e6dfd4ef07416fcd27a675a (encrypted)
Stealth Address
903af1efb8e0714019301a270129fe9a4d3a2c4986f3f18fc522239549086f6d
Commitment
429d3b205b7b48581aee2ce89c0ddc55ec90ab4f9302df6f879b3ffc5c6b0078
Range Proof
672 bytes (Bulletproof)
Memo
39508aabda31a98888cfa257791a7f8c23b0bf30772264f016f9b7590119e5d90f957964c709dd3ff3f4117fa899398f1846e6fdbe9493c58df3941e65aa416b918c0854069e076c521239fbd6087a183147002d523c6bf34b180654c2f664f4b94b86ef8ed8a9401d3315d144bf78e505a7116c7ff675e58d35d0983e7b6d1e (encrypted)