# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a222fb1c96e5c28c0c23dcd7b25c699c7e742cbb22303affaaf4e50f4c70f65a
Pseudo Output
c0ec0fd45b426ed9487f5a3f5f206a3858738720c937010197020feef9d76e6e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
16c222291c35df41b9b9edc7cb82db3d75dc2d2d060feed43399940b06bf8e39
Commitment
b63bd2e89ccfeb1fa7c06cf722be930e1c54aec4b37ff5a3b20df356eba93362
Range Proof
672 bytes (Bulletproof)
Memo
cb94c12219f39e5684122a3bd0a03d0fd08d5f5008de0e053fc84234c9539d7f55132b8b8a0dc40eee53af8192dd013979142606671d98dcc57fbc7fb8af0418f9770a4f087139e84e9fe7ec2bc611434e1b31db2e995e282bad1478682805e45ee4822e164fd8c1a0071827192d8bce057091a2347c00a96d9e5171a4d345fc (encrypted)
Stealth Address
aa45e44c90a473ee13c71af8f0f5d0c366fdc790599aafeeac98f907abee8103
Commitment
6c9e1c984bf341e293bc9e4b70cf6c552076c83a4b223631ae98e76ab8b8c43d
Range Proof
672 bytes (Bulletproof)
Memo
425072ed75ad1e24c0c68c94a05a72e60b1cfe32e2650e22710b8b601c7bdd454476e96352c5a174656247542755225a860d9b27300338a1555ebec875323d284c40cc63a642c170817c9f522ed13287facfba0e085e8c684781745903623a83bbcd06cfa013bdff66d7877fdb681cf6d70ad5a188d1574c626fdbb44566ec1f (encrypted)
Stealth Address
1026a3e33c62023b07514d28ce172baacbe9ec856127c872458d4c8c30aaa02d
Commitment
3aa69436535e388b5f3499e5653d73703176616fb7eb6848c15df592d4fcee48
Range Proof
672 bytes (Bulletproof)
Memo
903cf60b346995cd6ec5b3c0a5c1232ef4e5098a1bbb8aa52df2724953a6111f1c3df01bdd42fe95685f31e39c3feef10456d8a6e9141594aaa00cab4f16832ccef5d20a7dd500b73458df86de19308e674f8ad8a050a2422a222858fddc42a27b6f4130bc9c98bda5a956689690a88fbcab029fb7c3b09bec644b2efacadebb (encrypted)