# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
229f05cd30520186815cf638b19346d61ae73cfc728c52aae8374dc2e6938223
Pseudo Output
f85e2f2ba3a9266be9930e7218272866f60c162e49ce3179646972b21cdcaa0a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fe97366eddb571f089837e497c1b88824eec947f123da5bf44c7b3c23143a647
Commitment
f66c20bf6bd182f983aebb16c0f6304602c728917474010b4ebad9a29d98b42b
Range Proof
672 bytes (Bulletproof)
Memo
593b1fb1a32b5a85999bad09253c0f1a58c357d9390cbea95ceb9e21d9ca8c8d9a636710102b04b2e217d296710af79169fae1ea8c40db9cc94965b0a84c954623d2d08a7aa2ddf5d2ee2daffdef28d893ee2e112e46426174b7249fcf22876ce56340007643b5ee41e56fc8e022577f64e3c6b4e4d7a75cccf19b6110de2a81 (encrypted)
Stealth Address
7ec07a47c5e82dfb89eed56fd29d7babdb8db3b46637be52cd677b38047df754
Commitment
a4bb37953bdba890b42a289a3043c5945367f339da938a30088fc6224d109c7e
Range Proof
672 bytes (Bulletproof)
Memo
588865882361068be282a9c6f228d6b59a833949ae7d838053fd9d186521ab72f47af389ac0acd5cd85cae470844dac09a3da65d11def8d53c7ee7dd2a0d78f15a308290dd476a866bc103c0eb6176e01ede7352562ee18e500dcb0588c53208146c68a3dbda6ba33cd271010cb25bb40dd6cb1aa3a0941d55a36bb135ceef35 (encrypted)
Stealth Address
fe548a9e32c9cd3e77a5504b65ff3e2319a80cca95e9ef9ca2298137b4bde314
Commitment
884d5939a799e152d9a6a0a6b414cf2bdebfd4d3b3dfee81fc331a859e3c4e3f
Range Proof
672 bytes (Bulletproof)
Memo
462530572338bd1416f0b0f71ff138b19f4e589c4d4b253752ebbe85f9a22e46d33d013a11cfb2b3ca30547faddf9e0647b35dacef361a3a17078fa7a5dc306994c3d5a613a2f45f1b5505185751bc39392895c093dffba08517e919bc73e4c600d6f068d3ad4933f99a7f8729e63e5b428679e6de1fab25572eda31d9a25100 (encrypted)