# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
02bea69ba1c1acacb95835ee83999cde7839c6d1df35ffad9fee2c930112904d
Pseudo Output
cc4627356e3c48e66b4b1e40fef22a06308805cc7d4be826eeccfb0c8394af58
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
222e27006287e9b1e4bb7f58df5f276a0b5ea9646f384e7fd8d3938efe555a24
Commitment
5adf3faca171ebcc21e2c7a768f571b1dc7418199f69920348e73d0b9cd32971
Range Proof
672 bytes (Bulletproof)
Memo
860c958c082d3b5766b2ab2b1761181e3252169a91970cd8c33776edce7c675dbc29c47e4a26b52fa4ab05411534d13139f80f7ca76a3297bfa7a4900f5c291e54d27c0d3b13bf54c2ee6968ee466a4f139126f7215c6e2292122b3db5bd1686655ecaeb94a32827f2d6ddc9be16019b9365d487182fe7b226394cbad46a735d (encrypted)
Stealth Address
32b38e2d32bf53f37b2b16c7fc7c16c36c4ba6bf519a8846b359ed6861e34e0c
Commitment
7a9f41a4f9eade2c8bd5a9a59a8020a16c008dab0e4e7a53f11c54fa0316e90d
Range Proof
672 bytes (Bulletproof)
Memo
8108fe9355bb4e67b5f1e2a568bbd1368a0b96f978b87a03d1f4cfc577ae3d9d2d4ddab33a4764a9e7853e9afe5e54f57425c2c7b14c0c9dad89844fda9a413a6aedd09b4e2edac51fecf1100dbcf8be4bce7a684702ee2ca01dad239602bda151a315c4de8e29140985dcc4ec8b521b229573e92bca026c1c47ca27962201b0 (encrypted)
Stealth Address
9ee788d0253ede4c83e5faf195cb888bd4d38f4ee1e8da77038e1422ac7d574d
Commitment
a6cb21210a2700f868baa48ffdbd26f80985e7c915b804ba0333f21b25ded775
Range Proof
672 bytes (Bulletproof)
Memo
0cc09a77d1ba434a6f133679bb0cec56ad5ec8d9129b60dde2dcf14bb59f7e3f5a42b038aadfd8ebc61631cbd2f234fb415691c964ea1ed3538984aba43e2b1baf4caf1cdaefe267197b00df3a54063527f67874036b220f1166bcbedfd959abbdb3fa700c5e824518e4b8d6201aca552801b75ddd2bc1f7991a870e0665376c (encrypted)