# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4471282da0c76f091c548296fa8401abb6944167e15383eecaf090101690ff21
Pseudo Output
eaaa5a86521d2d5a0e72757fafc40ab442ceaad172ea49b22b73ac556655214c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
cc22f823ab6d77666583e03802e9ed84ce398737242d0965b0dc8d9811f88607
Commitment
54658dd5eb12bcf9856d135bbc9fe51527ba4b6970ce4e64958c5b505312cc03
Range Proof
672 bytes (Bulletproof)
Memo
b7271f2b33de6a6ae6779ec8c702b9f238a7423cd578fdba0a70c6b9b508f3882f24d22541ba92dc26b8e6fd33399418aa05e9142e9792a5ba0df6d430c84dc5ebec4e8bcb4be0e413a366587158d057368190c626f63af8e578a54605908ecec7c8554b878199e3542c2a03701bb4096e86d7026d8844a44302a1e4fca48816 (encrypted)
Stealth Address
04f9512de5765a66802964bf3895f8bdfe6c7cd9adcdd3321ff1e2b3ab3fab72
Commitment
24c083a822dfb7e22d43826f3ae43106f85a14d379a7c2808a63327068c70f7b
Range Proof
672 bytes (Bulletproof)
Memo
650073b8646adc411e3454c73a8a91b9b6952503e3dc01bfd45355591cd2e0ac11852e840e8c46f8dacddc5a2c87db6895b75a70aaafbf4722a31a1c5e77608336b741e5ff738c8f754b9392af7381e7becbd6026a280adfc3e1105a80a94fb4d1b96f8dbdf4fd637a515b01c8ff62fa208cf3c7801e940f36c063d9e1c381d7 (encrypted)
Stealth Address
0c95f8ccdc28200959a603f7e25a6120cf6d261c37a828788fc1e14caf4e7c3a
Commitment
6e057889221d00360fd96f312a8550f41a09f0b9e7a241e70831edabb8cb0c37
Range Proof
672 bytes (Bulletproof)
Memo
be762170b826a43012a7305d01b0d968aa1105d451a378a3fa38a1e7c9d05b3d03898ba85185f64a1f924b4ed8aa269af64f32adca77bf3132c20cd7779fa8b103afaa10677f3dfceb6bd5afc34eb0867b2b435606f29aa47f7f3406a752b161394de4104b5e89ed01b9216d0b129415510b0591052df35370c49950f8d4413d (encrypted)