# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9e545d58b808ff31c0906b94040978488a4e2c0842b854a59240aa9aa6db2835
Pseudo Output
541030d54053fe74e5528151fde0c292ff5768d8c10f2b695411fd9fda967f56
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
66d71405ca2fffff73cdadad811b9ef1003709f88782682464ac09936b6b4129
Commitment
80d3abea45e9613188c0315518767483ceeb6e391510d8dd5fec93684f7e237f
Range Proof
672 bytes (Bulletproof)
Memo
8420668f2d75eaa1d6e94a57f6578af43f93aaa08a363b3fd380f7a6e17cc9b6f3bb3e878bf4e7fb8c0a8c166dc20d29ffd75f2e8fa15964c896adb359565a4b1bc5846411f3bbbb0c875a8d3b184636c65448da06138c4549db75b5466a9c2c9d53377b8efce4091e8f3995946c862030ec6484dd07c6b8b806c50558b91887 (encrypted)
Stealth Address
ca42470abfa1002f0c0dedc9ded34c4db42f40f146b5ea44450d25f89c5aeb2e
Commitment
7c74b850946bd0f0bd1f179c7731c3e4a20eb0ec6286aa8783f93337c6234263
Range Proof
672 bytes (Bulletproof)
Memo
d780aec89956d2b3ad2b3c595f43b60247fb65bd9b9bdcbee460d11c8a4f16924f4dce76d1cff8fa9669b0d0b3de91261a4f4dd8abfbb88d92f31f37facfd2dcd8a0d31754f556b267e1308305377f4323fd1ecefd788d7d456e5307e0d15a5d39b1e4b8fce258b8811cea00c2b33738454baef4fabe6cd5e060b4848cd70f33 (encrypted)
Stealth Address
b6a56e2c3caa4944b2f96743b1d719520a1b756c321c32002817f559b36d0526
Commitment
6e2eef53b4cda6a68ed0cf1a4432f91e52996c5f02a62680c7976ad432edee4a
Range Proof
672 bytes (Bulletproof)
Memo
91b4ee312d41327df8ba06a86ff8fcd3b22a051ff251646f59569c1fcf079bd6bf76bc1517b67b082943d46c563c518601caab69b298bbb277275618d19196bc6efd0e9e44b88910a94e727110941356885335246a69c70264d8331889b02a7e1b963b24b6b4d10e0b05abf2337a08ecdd4375396458700c0ccf50c3bd0245f8 (encrypted)