# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
66e02f4bfea0c55cf1f511b0063f0d3b1b1529f7a7a3318f47980deab4b6393e
Pseudo Output
34eebe4e4044d8cecd6029882e51a1f2b5b972848a0cbb2689c5fb6a8262bc65
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8095a7a5fdeac33bb01076ef347f35be179d3d80f7f5ab7ad1885ed65ffd1505
Commitment
a6922f02884adc9c9ac528fba9e6457f91098507055fa139739eb525946bbc48
Range Proof
672 bytes (Bulletproof)
Memo
6e3f1dd173b5e0c53320da11e2b7c1ad2d1433b1c0fb7cc14a35ad7af91851b2c902358efaadacb3ab467899cf5c52b68a6d883c208c0d8d8165180e34835e9da9c4d0cf2cef8599172318b77f36c3f6f7d2955fee152d0f91e7a8b2d7053ec9c6eaca97a18f45535ddbbc120430efb04aa41ba7772d2e517339cb37489f9807 (encrypted)
Stealth Address
2ed75403ad9f2c01b5348bf9324c3d2141c32e9715c910981432291fe2efb05e
Commitment
aad213bc1d942ce201bdc61a7e0c10225316614a62c8906c48358c7a0f912853
Range Proof
672 bytes (Bulletproof)
Memo
2ec37aff5ccd5f5eb6675190acfb96ed82b2fcb4ce2bb699764d5044b4c0f95bd7b0ced2ad8347684f0b896c829ae81b22767cd80fb3f1d27bee56050c7ce5c9b63f02152a06c9f34cbd2cd9e5b7feff0d117321f830fe74a353c4a04831ce86f9e872ca4e5bff63d6034813f7f6e4b43de43d9c2b981f026e86f1c1815a8d2b (encrypted)
Stealth Address
0ca5f4020ccdf08fddd4fd619b99b3553d3c57e1d493bb1b5cca0351b4c1942f
Commitment
7ee9fb8209f7715d001ee3ea6fcd6731bb20ed6713497340ef687997d1abfc3a
Range Proof
672 bytes (Bulletproof)
Memo
73c70476dfdad8c14d241cddc85ca2ccd2bc58b24567c47c2bb6120c2364516f10dc80a8d9d29900b4bc578166eb495a3db68f630df362ac63eafe0bcb9d190636c52478c07a8302ded5f2f57257898af35814cd2e9bfc29897508b427e22f11713c6742326517c2ab432c671ef57a94ad8f4f5bc740203b718de62522b21590 (encrypted)