# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5ad2b3d695575bd44b19d82cad20b57b203210bf08f3acd4021e45c20d4cb72c
Pseudo Output
b8d3bc2bd1b5413135dc20f96870b4a4d89138d66fbe36dc694ed664b6e8d727
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
66400782aafab656a0e193d9f47720a9f86d2da6356122ed8b75dd6d3959c30e
Commitment
9664f8d08decdc0f008fde627c809b7ff63f5213075804724b8cd907db18022b
Range Proof
672 bytes (Bulletproof)
Memo
71e6b5d014472ce5c42a85976d6a5edacf3e7e9dc00ba3349bcb666daf4c79a3562a9fd18a747a6574600767a08c9faaff58da4965c1b2db6c734d6ef85614c23686bfac0227d694d3736eab86b76d25f737a3a81aa9ba33b3fa8c2c172744067ba85f243e686f211ed51775acaf49e6193b0242038159f4d20294074363d9f1 (encrypted)
Stealth Address
c25ef8fb58b55372d5c7aeee2747028f912e16887689ae1592bb6fce530f7b5a
Commitment
bc6a52c8be125f663de1bde4a9b208fe3a5025027bfec1496a1724d60e111f11
Range Proof
672 bytes (Bulletproof)
Memo
1179c9d8e523a7b1f9bbe728014f11c49f6207adfb28151dbb450b4d010a0c810ad56537f268149ad924a0665e30af56e3215a488df36082832fba0ae40fabdaed92d3a345b9ab14f946aa89bca8a3ab0690bfa396c3c9b0134ddcfb31fe43646583c740d6e5142b140e04f727efaa3505dfcc53d731848bc63b23c54a91faab (encrypted)
Stealth Address
28e534255ff170b4ec0dc4fa4e58a0c2172ec1a1335fe9c9dffe754321e3726a
Commitment
f88209f337ddfc02cb6db3180f91db45d2a9dadb46b53eb761676fd58d3dff7b
Range Proof
672 bytes (Bulletproof)
Memo
0337a035ac288b90119c1b18f6f16b1be6d3a255c28ae07e790aac274761599f5758fa08a166284e1d6e407b8fafa0bf492159356044dbdf2d6d7e88a7924fae220ba7e7fd748a1d14e780757f7a0aa9cc5b08358045e1c0ac879cea53a27ed4cdc6f75e734fa195621118dcaa7c4a4ba7b9594db1cc62c84e486cd98db90b3a (encrypted)