# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
dca693c4a3fb3708e50a9a13fec5567b30dd966a5e30f64a370fbcdd14af2b59
Pseudo Output
04bf2b0a9ba9fdb620405559d19ff8dac2ff1461e635c7e759bc768b10f4f300
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
66df29c109f6908b5c7059bfb54f9eb74c680649bdae1357122e0917feeeb515
Commitment
763d9f8621c6522b7df8ee71e0ac30c63f350d182f63dafabdd8be22e4458b53
Range Proof
672 bytes (Bulletproof)
Memo
f4ea7e7a6ff7b9e9ab276b4d18dcfba4e9d1f3bf96b136fff69461e4b616962b43ce7e605fee6dfc0f26a5b8b922f813ccf2795f3f44476ed89e75ab2e409c164768c591367bfb58307f9792d4b1d34dbfbf5868ea167c23403dcb93f6319b2893b94aa8d030e355045a20da3a601e89a357c1a7ec676eed5c6b070b01b13878 (encrypted)
Stealth Address
10356042b8c287f897d288c6b97973544c9ccc8c6d7e4bdde746aae423d25b1e
Commitment
2604ad4fd3771da5fbbd2f1e07cdd81ad193b10cd8809c1920e8088e041df70c
Range Proof
672 bytes (Bulletproof)
Memo
67f85f5717c662f65d30208a69b1a56edd841ca19fc3dc69b6013d2e3b5479f27c1659d1b57d8a2d3f1252457ca76f823c10ebfe4d5a56196b0a32ae6d4ca13bf55223ab374bae1052b950135d7d510981810a734e5c3efac1518d3dec769deefa4cefc09ed6354c31a7de59b4fde2028255639a94e2ff17558405f9af37a0f4 (encrypted)
Stealth Address
d40f2fd0b78fbbe7dddf8051ec7478bdffedc64b3a3cf24f7aa9d479ecff3a0e
Commitment
7ebf5614cae25e183f30031a92229c25e7bacfc2636a41060ec1503136d4f772
Range Proof
672 bytes (Bulletproof)
Memo
ce7a30477ca00abad2a1e2a3c58fe2b2101a6bea90cbfb7429c3d47de46e59cd9087c655182bdaecab43ddd467eb77db5482ddb7a66072e87f46908978ff6705a7ae3935d36b9426234d8ca02451cab8e79a579df8d6d305e0ee9813fc46e0a4ed54b62560316390ccf5325644c1ad55e7f273a58bb14bd6e32957f9d0a37cb4 (encrypted)