# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
78721a6d99f6ddfda8fd8a2c5876f20bd0a3d079c4d843299f54a21cc8b0a522
Pseudo Output
1cc8cf340c3b0bcc2b17cc72a2ae2593ac06b6b9ee2ef5d7378ce71fa6c21877
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8c49effc149fd332abd9c6acf2fe3e37b5b6d90658c83944fca70a532d81ce21
Commitment
066d05ea1af94b1060f0f1d1d0d9ec8dd5004c0f93ac41b42e6ff18db555900d
Range Proof
672 bytes (Bulletproof)
Memo
015446502544658ab94d55b7a9e07674bcbe446c91dc7f5c687abfb1c591675d3c178a40c9af089fa5c786f2db694152197819131eaabd9518f5cc070043001dd7d1e479d12c79e747eab90476bbda35ef6e7e12c0236c5fc773881f93370dc9a6d7ec78427e73570c97781bb488cdc91f3488846f5a41600deb1753925ac6ff (encrypted)
Stealth Address
6e0e1e47469de0950b7f362652667ace1f82f02eef2483b5bf2311e584ae9b41
Commitment
e432be3978421fd50a7678b3eab7b0aaff7d09e4f79ca4c774665e90301ce265
Range Proof
672 bytes (Bulletproof)
Memo
73b1d6d3c62ddf789365143533243f477d7c0a1506a541dcbbe5a659b42d14e184913af67c0e4db8be6309cafe0e14ae049f0ca9a417134156c7706680eb0fcb7a1a5eae92ddff5de348ba6bc2b079891fb9c9980caabe061843fc8af9787ca3018d35214cb3c891b6dbe38770b483db64ee74586d7a1b83f1322c375be98bbb (encrypted)
Stealth Address
663f8d0f6a71cd291adf3c40174b3b5be64c429d7d3d5d1499ae9b136273e87b
Commitment
5c103c8f39be4186cf0af05d5ed5d5f646db79f418c152aa20ee3a9178d1495e
Range Proof
672 bytes (Bulletproof)
Memo
abb6804dffd1ed5dcde784aac9065c4ee62a328d7dcb838078f02388b221207568044b972cdd14e9b85719b954b41ec36cea5a7364a87b20670b342130bcd811b23bcd51d474869f5a28236a50d4354f164a1ae600e15f1aa665b2eb2a2f755aaab8d7ded4318ef4ce85f3ac60c40723589cb5c06ef9a2225b8e7a21a42f0465 (encrypted)