# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
92be57c1494786f9646ad7af7e85f1bf060e868353194a99ba447ebc24de413e
Pseudo Output
14d19399c1969bbdcb82e07bd7eb08f66594959f88c291275e36b563e081a915
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
22eadb01a1744928283c8636adb3b0420e915d50aea591c1cbd5d1bcc2017d6f
Commitment
a432b5d2a5dc13d829b3c3687f3b027e8a7327abcab290be430b56685420ea73
Range Proof
672 bytes (Bulletproof)
Memo
cb9a12692a0a3e245d03a9c7a0cb00cfcd8b653c38f83445ac25c2bdf6a138840929dc1e49f2819460b89a5892af3bd8d60efaee3e5dfaf10e04a704a41933460490e0af931409e4a646934f2b935e814553940c2321a6c511eb16f340c0bd75b0bb6294f89bb2988b220341888395320ba7b5e1168a0c7bde5e099de8abbcb0 (encrypted)
Stealth Address
0493aee0186d74cbae08350b703411208d6146f3d6c20f4ec6cca5fb5091d614
Commitment
c0d006c60cfa5ebde5c1785a8bfef2903fd07a54bbd8600656a0ccaf3d669e43
Range Proof
672 bytes (Bulletproof)
Memo
f847ece07f9518c74f9a3900d72400a87e1a4b17509dc0e1ffa43de34358a8e5bfe59957fc4a753cb05c715ac5185972f63c78d0bd6a552601a534d59ee288692757a8d94627d660811b568c30405fb6d7dce60167e0a34c5f24a4591cafe8308fbeb9ac95591683ad40396b614780c7ca7514febc9525278d885d5b934296d1 (encrypted)