# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
66acb5539aa7d321f91ca43dfd58aed3152442789116e49282c79c69caadc21d
Pseudo Output
bc51d42a3ea68feb700a4629e8f0309f744bed3a79300cb55d6273f5350a182a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e228d4ac07154473390a6f493212657cbe29d4d6f38b470ca81a0ce1df830565
Commitment
c66d74f05ba62073b8f91c73652bfbe22465df5a645e3e7e104604b81cef472e
Range Proof
672 bytes (Bulletproof)
Memo
535753b2375567505aa216f6f18fc4eb63e3a257f6161cb5c3100d557281cbdfad0f06ee88b42efe451791dbcd271ba5f42ffba4641e6f37c2500c1346c882257e19f89e6b7ff5e2abd99d4563200fbf73882c6c4bbc69d98a626144856665ce62d69e798f18276507af5616a7f8015532bb31e0056e1f53dd74293816100b7c (encrypted)
Stealth Address
daf2996373413b13b38bbfd3e888a28aa5bfaa7eddde7eb0e13e8068a1f8ae77
Commitment
c8db93497f6d5523de626cfabb10c47ee1182d69b66f0979c21eca8aed05a232
Range Proof
672 bytes (Bulletproof)
Memo
e1bd5e1c77f706304ec8aafb96e4889f57919b84e3f0dffa19a3e8cc362646e82831f1940a49d61d44b506e7eab97a21fd33d23c7ace16f564c655033af14a621456dfa0276f3b0d981531add09758ea5d88fd1d030cca026516156094016f05a3c2d6c4f4a0e12abda8acdd135f64ce90937a122f42063dbb744fe77b5a5fd5 (encrypted)
Stealth Address
761158c3e39a56684c12360d3025a96b8df3eb016bb4724a8c3867b6772c385d
Commitment
c294f5b47984d9a212d73c2f0fcb36525a79bb4c17dbf9023912e09865889621
Range Proof
672 bytes (Bulletproof)
Memo
ff55344fcc005303f9ac057b737d75cdde1773ed4064fca1823d3406085993c682d4d51b0f225f43531bb1b001297b87201fac2ea899ed8a87c116b84b5f6222d20509e9bc9a9d630c88ba949148774628d499e6e78d574c46cd77d5f6f39b3e73ab6374cc116bbc1ecdb2e0d7c5c245d16a37a617b9053977b4cd2abfcd2171 (encrypted)