# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ea595ed83dd8ad5370f3787d822e19626abc8089889e6d464ab4086de635d95c
Pseudo Output
a81a7553803789e7ccad414b7c82051de8cfb285ed331293ef823e8a64f33076
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
16666fa3c62241cdae047f0c8e8414b0e4076a7c234e6b9871ec2495959b3412
Commitment
ca4ce1bfabd37f977e31b1c5e3c3313451613147b0b4610f4e73aa5b709bd401
Range Proof
672 bytes (Bulletproof)
Memo
42504f6ff4fb5f389fb4d907eeca76ded852f079c3a94f6147dde5f2400639095fec5f6f06d12e83d135eb023784686e2ee2c439966b8f680d5030292e71c37ad6d8c0b80b00c9b48a62d3a6f957a82d34139c08605e8b7b9daa2b3238ffa6de2fe22492c6165152449a7bbf373b66de024fa93d4f7639f00ba7586c3cb3ccab (encrypted)
Stealth Address
e6d8a92ed3de7837313a5620b094a6e2c255506e723a69a522928f799920d659
Commitment
98da3a2665aacd6eb060613db3f64a06c75b5d50f6f7f6a09409b141bea10943
Range Proof
672 bytes (Bulletproof)
Memo
abdcd1f5feb05effcc2604c3a6bbe6da212fc143bc160a450a0c041f9f7515580189137c25211e8f7d426dc5890f502ed4a574eb4b7e765353546bc456c8f5c721d57dc38577adff641cf4fba0868c64d9886e219bfb8c6b173d44677d2f64d791cbb2849c3da29dcf539e111b3ba2d3aa486cf43263f6db9fa161b4b24b591a (encrypted)
Stealth Address
76c5394ac588d1f72b409e43edd638488c6283a7f7e104a6dfdaff15011f654c
Commitment
d0ed912d152474801356f72d8c2b615e90da4da5b2f737ec53703f866caac244
Range Proof
672 bytes (Bulletproof)
Memo
7142b00558d9abbf65fd866a2411b7f242f25a5e4f9fce4b6d67d59118360648bcfc5693df7c8d232d1421fe2b9bd82564aa6b7b73a4425f87e9c2ba3b0aa7bb595c447edd29612458661f23b972244c238218efdbfee88f2bce0030a2c7664a3f6c390c12f279e9ed4e1253b2c41079658d18431a2edafb35ab8f652be1de1e (encrypted)