# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
66ab5b7d17e7e769b550db3ce5d9f8590044dd6d399998f6c6315da044512858
Pseudo Output
8ac07161244a844221ff6aab925b59b43578017a9b51e98fde31e47d560c9102
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
72ec4fc990e472d8152dc370380be4ec492ec8a2b8d05b93b9ceaf83cf0bd223
Commitment
bad30c66fad0d2f25d2cb4f48bc126aa4b24681c8d02eee3f260199c1d9fc51f
Range Proof
672 bytes (Bulletproof)
Memo
93c1f20ed7cae9f512914119574e1ea3ebbb2ecaf57f1be5984ef3a3aabef8ce3513858817a8ae0afd8985dce347960754eac4568e9c51d8f5d16d08b5e7f8cb128e7fce91b83b3cc18fd9f91cfb2a2ed7101d43a678310763499dc2ac38e4b1befe1855207a4d78b31e1ffbc33e87f0a915c5c63ed3fade1d608218dbd1d1e9 (encrypted)
Stealth Address
664e6b7f701cb946988e16599dfb325e6eaaa536252283bfd192f17bc9476653
Commitment
78b985a0ae6de7ffbfde9721481977d8619c6f8c10c7bfe364e52881260a112e
Range Proof
672 bytes (Bulletproof)
Memo
760b388adbbf483f44dd6bd4d570f263359fd8b51e3ae4862f11e515000ba73d28c1befc2ae2db7eb5d44c75562a77c07cbeeff4df548ab03e2ab17468163695f0695ae20e74696e15b80a519446bfb6ca94f268b0b9359b7b3ffbfa410f9259a976e6aeaa9cfb0ed8f64889ff9a36a143eecffc6463acbec7e7b9b106c3bb8f (encrypted)
Stealth Address
460b186fa1ace2071fe9bcf3b7c2d015bfaa37a5e5861095e2ecd43efa656a5a
Commitment
a69f2d7398f841905a22b7542eef0be4282511600f148743e0846a14223cff48
Range Proof
672 bytes (Bulletproof)
Memo
374da587c90ae63248aceba6be2c383086e9ddeb151722716213a3accaa25f9431def862d1e4a026d953996eddb55330e2cd08b453f7c811b528a291f81741b8b3c100cc19da88b48375a1d7d64b32a4cdfd00d1b5ad0263facccb6021ce217dff677e8008237d7a82c64b69be9449914a3435afef706e0523cb691812e42873 (encrypted)