# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
22893c7605d92cb63b6cc1494208927813204371093d5427ad1ba54917a6e07b
Pseudo Output
2044ad52f7808fb3d50df3fbd60383a95e05b99fd3bc1eb1d4c03438bd746d52
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
20c112105f3d0b88b1888dff221d0f6c879043f3ebad35791661b7a2f7328020
Commitment
ac0dda7f162b5eb594d84d6b8614191744d22729d53ef300070909e46820fd17
Range Proof
672 bytes (Bulletproof)
Memo
d92076b55f73488b5ca077d5d52038c50159148fd50de3f7265a2bf99ca07890295811c6e0397b497ad26d8debb24e1c0516f6572fa6931cb63d60b91b8a8c85de9d650ef9d1a9d5c7359d384a5b4a3bd6ca2584a2d70fea7778c1cacb72b32b7b1fa527706337149e03cf91fa36803632f88f0d1017f7309fd2689e9d39cb4b (encrypted)
Stealth Address
de1ed565d6fdd18e846d7400db9efe661d79882c2be521817c4c7d581cf3b41f
Commitment
12a28aa0c0194eb641f16d9e2d1365a2f8bf00ded395d552bb723fc807ae3e61
Range Proof
672 bytes (Bulletproof)
Memo
3b987b88acbfbcfb9a3ff2e5ec92ae46827e32482b24f850eba22e7fce3350c03346091f7170914015774810544aa54b3342c616f43645caa1416200936429f34bfad26ed4fca139f12e9f3f9d86e1c2dcd350ddbf2ac674f6dec3aabfa74f34a6324585a22242f678c2621620b80b885efdd0d9126bf8d76bc64adc3132b20b (encrypted)
Stealth Address
f646c75cfff8aff7b629e34b35d9543f7420e79035f7f5272a8a0a0f4ed86c09
Commitment
c47053af4da63a0a57ebab44784175830b17bad9f3bf2feff6e8c3078beabd50
Range Proof
672 bytes (Bulletproof)
Memo
3dbddaa7e4ef905a783b651fd9313067c3531ed3e620d401b46949aca9d87b5a574d236bba7de48b642cc797291d81ec96ba8dc6a6022d3e09edb9ae0397139885b331d87a47ad1d3d681e60f60d37effe8370135570f631752f90f1aea1269ca1d90f54419c7375b8d63e622f356b0811b0feb1a7355fab8812a32c25e01fcd (encrypted)