# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
08866c50beca829ec154977ed1211f034c2d099eec23a1b633396c73551af90e
Pseudo Output
14a64a0f95d0e01cf30dca4200407f07a463b53a96d9e64034fa615181c2303d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
22afdc3022c4fcf81dde865a6ba5a864e379fa076f1b971289c023d99910234a
Commitment
4875f29e29b551fe0fcf10da75bdd3eba0dad21bac90fbc1a8dcdbefbbb08140
Range Proof
672 bytes (Bulletproof)
Memo
5d193d218d920abd80eb6af97f676bc8c2e45a57cd72f1409dd1c9f40f9da9e299021678159e4404f6b478b9d341bbb6541ad9b89f00dee9eb505ead3f44aca131c84b4fc3337b4684e8025effa4d4bcdb023e9b0b76109b0e32dd8bbfc87a731fab64f248d8f1ecc420b27222a368122603374b9063fe40eaef11402bb266c5 (encrypted)
Stealth Address
c4456e6c1cdff448ff40da0614d93cd56ea76bc140b4a535dcfc15727d979d70
Commitment
4a2cf9729b49beb8a33b4414b671300f3b7a6bcc14dd5b0266a8c1c1346d930f
Range Proof
672 bytes (Bulletproof)
Memo
7382529fb026f11691ce877936e61ac36f9e73b83cc94b448a50bdc98611b6d357d258cb8fe42245bcf2154fb9a67af0a6724f0983a9b8ce0de8fd1c1c64cbc32404e7989fd0e01c85f9ea39d4e74ac8fbd60c56f4c24692bc16d5c1f5bfcba51ed42134440d9abd766e8d241b6e48b26a2409aa2690d5b426111fbeabc6219d (encrypted)
Stealth Address
423c77e0388fdcddf0c8079cd036c38bc449078e26b8d8781b7a0de17460955f
Commitment
a4031715eab43d5f2d79b16ab36274482637fcfeb0a2b616a5b748c82a33f61b
Range Proof
672 bytes (Bulletproof)
Memo
58c9331616157895cf377ef64daebef57c01245c82919db4af5fcca369bc2e0907d5b76eeed6e2a31935916b87221a244e2818f13714c3b5db4808af9a6ca1f8bd6bb3dc2365c1bb98cb838b9e2c15ae5c6833de78642b6a20f6dd8a529a46323776edd2bdd4aec521007470dbfe4f02f2e932ca0c32a37fcdae928d85ca7044 (encrypted)