# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
66beaaaa6c975ed7b7c3f8fc96a5bd6c2ef6d539ce9b98f5badd0bbdd043d935
Pseudo Output
c24e85898b7ac47af1a9fc38ef1aff4e2eb7bcc7c0e741b98d2b742ee80e4a21
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b495ad4e890e5900dd31fe6a3a72a675a6f66fcf6ec1251d76d0a7f88883284f
Commitment
aab6e979f25edb717b9298f5d361765109cd0e306bf3fd5de4f92869026d8f7f
Range Proof
672 bytes (Bulletproof)
Memo
e823b2ce781fc84938533df8d37d6c37642905257db664719c082b8acd11cc63a0ca13f92d950b4530cbcd09faaaeb51395e39d6b4c0ea711af2353009de843e349c46953bec3108b5ddb792724bd7635e595847a1fd3f0dba44989862d951762ab0baea7df74c67805cba62248708db4d8079bbddbcec4203c63316a0403994 (encrypted)
Stealth Address
f8294472982def89d0e4f26272d126875a126d21e104894dd008fe65ac51ff3c
Commitment
f285d6cbcd035f519e2a579577a0e8be9719c21bc419b7ce6084c87b5d29e014
Range Proof
672 bytes (Bulletproof)
Memo
94867780ed680b8c0ff0715a7dda4d82094381b54a39d921ed6bc81f02c6d000fedb4014195b8790557e87d7d54f939e0ab4afb646f9a219b7d08e642a2cd1f681a986e4b4ad8789c36eb4d32858e42502a357348786e4e130ece048f92c95a7cdf1d749f85ee8d94fe47068c26143f552751777c7762bf756f569b09ba7bb00 (encrypted)
Stealth Address
fa577c362264c14e6ac2088caeedbbc0bf18941c5409262a6171e14c23eb8e19
Commitment
5ea426adbe1415c826712c45a513d7ac479b8c4f85d4e6eb4d52a526aef9e05a
Range Proof
672 bytes (Bulletproof)
Memo
746357fa8d6034e9cabb734e626e0ae7cf7ad3da4c82686045c42c2f7fa194d5461ab3a3293be53495697bc2c5bf5ca47e562caab0a8945dd5a4b9fd328dc62ce76b94bd5e43dd00eb5f13630e301a541e340408cf55dcf259f5f62df52f8caff6633736a89719922cbc0ddbb66195b2aca67310aa4a017838d0787f94759d4a (encrypted)