# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f023c96c27b346b70b32387c695e06653c6e4b327af27451e695a3533d841926
Pseudo Output
aee95eaad5db7d9c9ff47ca512612f73cf7067fd47c741d1e0181594e1c3a171
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
223f5f807addfc074248b91cd3bc154528f99c87719c543aa6b75066ac8a0849
Commitment
52f1040e8142cdd91e1b47f8df14b6a314ba24d2b8e624215d1c9f2a834fef0d
Range Proof
672 bytes (Bulletproof)
Memo
63ba70cfbb1874fd3bb9a40bcd40e268d194c9940f4faea2e7ce71049e28127df64f8ce936cea77ac7430c6249b0b4e8b239a50eaa1ecdeec57ba4af7800e4b8d0301d581e20145384c130713d45a29daa259cb325ecb5e2fffac0015a4d08e5ed2b1a99e95d4c90fbdbd7413ab631c0ebd44143682dccac0bc60dbfd035099d (encrypted)
Stealth Address
e0f868e18c858cab9164ae1d8c098eaa6c8a61e3ce330426f1d57e82e3888d2b
Commitment
4e23f02feed29d3952f26bf5886715e4e86193ee5adc89052b2be9c13c28350f
Range Proof
672 bytes (Bulletproof)
Memo
9fd277fd66f668cc7d9da07cd05f5564b51f89bc78f191cb17048aa5962440b2524693f9ca478674441342a2c4369fea12f03f256dd5b2b782ed139af1902e07644a86e1dcd4c27ab5ac1cb5f24b93876e0d4c1e3b0098b6424a3ecb09a097b7b7ae35e85ec87db7ec152541a0ae2303e2a1578029a4c7e2cf698d5ea5a550cc (encrypted)
Stealth Address
b8e1f71dac2620e224f9a7183b33790880342ede73dd85ee4286cd1e4ef7183b
Commitment
d61258c5c8dd5b21943d67ae62ad358753c450564135e19078254ca74514a11f
Range Proof
672 bytes (Bulletproof)
Memo
c05d3ba07eb1206d551c4dd9a91fb93ce431dc7f406955033b343643114f2b564678882e437c4a543202377c52bfe2a7cbf107ec6eba944bf9d133a8287497ed9469be53d207051890a5e108b58bf55445a3fc5537404eabcc91798f1b6bd2e021ac4c77b17ab876eddbf4e82fd3cf52c1db74582cff694b7dbb99787746eaa6 (encrypted)