# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7452844a77c2622c5ea91e4f20be956753143405d4d1d62573c3f7fe348a012a
Pseudo Output
3e716a75a761f0c9410681e6b0c4943a2f2d6d06b64041c2fa8f4179d1400129
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ec430b6de9da26d90633740b803fda8037052936e70a08455bf9c6bb4f650814
Commitment
66e34892227a6c2e93d1a6de0b862e1309914b4376b575fae337efc6913a1344
Range Proof
672 bytes (Bulletproof)
Memo
ad106966a28047efdbd79ce6cf96f0953dfaa63aaf68eacff1b0faa5af148894c05fd1dcb9d4598a1d51bdc7f669e2256f8af8f34ff76de473b47db6709a53b65efffa80af92d026b4a31fc80e142d6b69263dfc3f64a46d5a6c511cd7da4b8a1219c452d47a244e3f50e6e50d34f338c09de6ed28fb7fb17ecb75ff5f77c9a3 (encrypted)
Stealth Address
78e86718f8b5050579358e81fff6514181662be5fcac79cebf294c6b61594e60
Commitment
a8481d539ae089f55d8ce0e21e9c121cbf03f3628c56f7e3e63b13a53bd62c2a
Range Proof
672 bytes (Bulletproof)
Memo
73b56afb3251f28a3c70af519371e82559d73e5ccb05660de3c79d5c3ee19b6fa9fb12a027d228b3462435dfa2c773e9d39e47fc992bbfc484e07b45463712280ef1dbead3e6b78b7ce56233d975a7adaf282611265713e998985ac3016c53564f8373f4829ade4d2abc376302a7d811822f33add567e205912ac06ac545d39e (encrypted)
Stealth Address
60039629650558196e1b88afbaba7a73b0c1324387ac7b53bd514ce501149323
Commitment
f47ac49517c77b334b811d535c67f1f05160e66f86896d3624520fd79c539f1e
Range Proof
672 bytes (Bulletproof)
Memo
586c8c13a081e91f530d2d2559fda10f775c068ffc675559dbc9ae7081a8e3a9d3043904effaa4035b3f8f302a3bb3d3b5a65867f0cd392ccc5c4442fe8e6ed6699c746f157f17c5b0f8c1349f6198646a1f65a6dc8cb6426f59a26179f57e4318805f4b03f72c0e10ec49e834178510d1e9e90fc4ad48d5ad405392aa223bbb (encrypted)