# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
72e8923e3825e7ac31ef09f9e5480f059cbd5c5ab79ecf4729e79bc6f51eba17
Pseudo Output
dad7e5a1e38bc6e32f660dc71ca673c6c2942a3f1ec443ce182e5c37bc27a801
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
66625305f2f3339a8ee5a97326014e66f24c516e0345972e74c6417758c92707
Commitment
f0fc4e38ca7d6e2003a8c1c3dc7073e86be5fd4eb09d3ebe55c32078b81fe506
Range Proof
672 bytes (Bulletproof)
Memo
8c9dcf88979b4915fe986f14e5c36679481930199fb1dec56265954ab68d9d9591c23c8da7b25f14cfefd6b52f137f52f832b707a16e97fce2220a19daa14cc1184e8b6f9ab5df50c53203739197cb94203fd78f7bb2d6d9c233e1b6eb389bf25934cec5c47e6de3df564d20070df4bb4e1ef48376ca83d96ce365dd33064a6c (encrypted)
Stealth Address
cc370f609d3cfd677dd594e2983315ace576e5e19122cae91d27411362633a1f
Commitment
8423b016bc06557f6bf18ef2bee1c8a72d62438bee90387bc0a0eaf34b1a4878
Range Proof
672 bytes (Bulletproof)
Memo
2ad0d029f51dd3f9463afdc4f67dabe942bc969173249403c55a72eb25339fb52d91107290966954046283ae2a16fed6fb6ffae5ff7476deae0565010ec41e06b48a977cf9b2dd0825b02b50eff1962e857bdae2ad2c9c718c38196b945cfa9ad0fb5a366ac0643e569cd1889f0da0dc8eea63c145e0a4662c5bc59280057f7e (encrypted)
Stealth Address
0a21720d7ac1c4219c3d5a3c975ce14dc054ec8eb69f26cb9f4f5cf53dc6e423
Commitment
8854f5079e944a49992eaffae445e2f2bb92a392a0d9fdf4d3e0d709a785012a
Range Proof
672 bytes (Bulletproof)
Memo
e198e736ea2d4d616fab5c865a4df67aee42bbfb998fc7d334a090d150087209dcead7cbdf9640893e72cb84728280c90784c690ed539af165746b9b529f9a700744c6c3f21b9b97e68a9a9e47ff51cda4c1dc8044cc695ff1c2949e1566d6ca9f9e32302901c0872442ac7521c53b1c8ec80bfab25995956f993e56d91b029a (encrypted)