# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
660f34606f7d5b6ca24e10d8930c3b8bfbd84e45d317e1e4d823d7eb27895c10
Pseudo Output
b82b892bf0a0440d9e503c9f53d5c148b337004f5d5e3bbb8647d376b749e201
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
922380eab5985736b7bf75894763de483155502a5b2313539cc92315d0aba902
Commitment
68caa9c15072c320103e65a28fc5dfed51329cb3823b2429326e200aa14ca55c
Range Proof
672 bytes (Bulletproof)
Memo
b2b60011322537de142a6b3bc72d22e9f15c1cad7852c36a706703677ba5a20a7d5afaef9af7311b5a4872aa4e11ca73ade8a4df0c6d89afed91a47529ac71e24d62fa1957d639fca4eb86c68f801f6cbd70feafdb3d159c6f654847c67f28ac0ff5d6e7f72ad2c54c244c30571886f0bfe0271f4dd7ff1a84b51add12acfbce (encrypted)
Stealth Address
78b6093885dbed99317f27f589bf794015e655684a50898a7200219a5ec22058
Commitment
e28ed52443e2af2abc92a51bfefc29bdfc20b68c2778e9f6b0c5ba49690ff977
Range Proof
672 bytes (Bulletproof)
Memo
30c0cd3f53e370b8b211d923381cb6e4d82b12711d431c899b173dfebc1bd72417d78f0650fdf784f64de3cfda3c8dd67b2cf408cc5e714ec18815bcd6472fccf0d5f490cc214381e0dd102702f46dd900d7fac0d096cf155d6cc75342741aad7d21dc3b3708573daeef5fc1d30942e39b1f82894764a21f375dba6570b311ec (encrypted)
Stealth Address
f2be4f631bbe7067f2c6d0af70cb506d35c957c177a5f70f168ed98a8b5dee31
Commitment
cc75366526c877da772cfe486544b8bc1b154973726a8169109f683c438a967d
Range Proof
672 bytes (Bulletproof)
Memo
443dd2e9832c6292f34a1c660cdbdc294850367870719c11fa37219f16fd8d1e05cef1740dee17e306287c02abe2af50dd510263294f5eb438aab58231fd6c5c2ea76f6420cbb7576d748cda88929be7ee824882c9bdc8ebbe7c9292311536ae80cca7c77f532692c15ccf60254bd111560a5bd4d162de79e433b02eb4b276dc (encrypted)