# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
225d05612a8997ab164b26505ce7391ae75d61f3976d3030277ac389e5b41112
Pseudo Output
f07dbc9b1f94915f3b681faf43a2c010cdf9137919b21a5c754ae011a5893765
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6226c58f9f7fb26153411434c70950b44837d67778dfbc7b292ab2fa6e2d6d59
Commitment
bcdda474aa706d09dc665672eab9a2ff8e05076b12fbdb2637d55352c3b8220d
Range Proof
672 bytes (Bulletproof)
Memo
e87bb658666a233ab384925d2d8c0477055eefdcb896bb27cb8b91b6a315bccb68a7b13130dc6a7ce726e5405b7207394ccc605ff3c9d9d2ae62e875ed5226f4b9bb896fa4d7760d6f47ed5a84ee729c914b57ce25a3c2169ee8871bf09498fd440dbac9657a89b21af5c9468134a2423b4c22c966410c506cbc19d7021e379a (encrypted)
Stealth Address
0ea1476a23d18afc50bcbeb80302dc49b4a3ac7408fdf321693ccc3b4d24514f
Commitment
a495ff79aa638cdb3bbdee5ae1bece4d04b450d01107f97a863cfb281afe126f
Range Proof
672 bytes (Bulletproof)
Memo
564aced4a78907263ae907c367f23325b70b00e8402980840170ea608103334d255b1db7e72108818500a081b5e87b603bc2164fae4bb39859fbbc49748ed8326ebf203e6ff3b1f42e73ebc27c9184399599bab69450929ee0676804fa1b0224dd66bbd309db4b06f92584fa60dd7a8b3fc787fdd25db599a29a5b64b6b8f5f1 (encrypted)
Stealth Address
8038bcd89f69a1a9286ce585b3a9ae216796b8015c6960e4de32f713fc634f11
Commitment
62c79e1e9bd64834782ffa4f77c1e5c04422d70925c41b0d7a0fff47134b4969
Range Proof
672 bytes (Bulletproof)
Memo
994fcbf76c04721f9fe4f900fddffd0042bb346488224cdbe30c72c50a081f378cfe4d875450bb4440348adb0e7165d87d0046cafa5742ebf288d13eb4cd9caef2b3b7aef7ddc973e89e976ad6848f243a420c26a87c7fd90d7d480e9253f1482e48d9e2c2baca50dbca132082ca6b4475f017f4d045ff28d819bf7b15a90a1b (encrypted)