# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
90b8c670717a0e58bbcf71f4e8d26930d487cd92a92c9bd6dea53fd9e0a9b31b
Pseudo Output
feeb4ff76263699f0048e16648d87d8bc1aed1386d6b5df92582c4e1ebf5b123
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
66af30155482d1289d093e87002962080f028f31009ab600907d1ee59822fe4f
Commitment
16d8cba78904eecb55e3deb54110ffbcc76d84d6a35dc877fe50ce1913f9d058
Range Proof
672 bytes (Bulletproof)
Memo
52fdac6881b1654566e8064ca91ff6dbd39b58f618d5e00b49cbf411b1e9ccfa0da6bd21908cd38f89587bb0cf6cba5c2b8a5bc573c6aa7ddae67c4b32f35bc25b04ac92d23bb122d681feb7e2fb4c4857b638b9787df433efffb57618eae487f37ecaff4dfcfcb0c750aa6dc4dbcec125f75a0f3fd6a3576d73d565463ba58b (encrypted)
Stealth Address
9eaddfe92bca3286854eb9e96f1d7fd8f09de990656544ac8573d7923a35cb5b
Commitment
c8a4d39f4b1113707bb2067dc9110df84a954262c1b6efa859e4e531ef7aec0e
Range Proof
672 bytes (Bulletproof)
Memo
e9b5694970efa220b61d75cc1ce8d07412ab49dc29cf4ddd9125fd138b06f7597415eedf5a717b7129be720a3535b206a429382f940973f3ef8c79f48c0e1dfdecc0ba67f5efa0edfa7004e22be7c574a4c30277a91e7c0fbc7f4fd4b381ea7459a8efa0c46bf29d447f35cb795a6973dd65c496f9d9be7c7da9c3cc902b949d (encrypted)
Stealth Address
c84fc965e70c134ab80121f6b668f09ffd252b8bd0a7cc5d3e507e4261fcbc4c
Commitment
a0a85c7f394a582f4cd20a622685d3a20406a410db4934c1b9f42b91d5265158
Range Proof
672 bytes (Bulletproof)
Memo
fde4cabd51133ced3f7d429c3293a6eb874686d079e56493a36501d7d63a41ccde220c532c8362cc5a6dce521032ec4897c6a6d1e12a55b01bf71264191f43d045277acdfa8aa3229f33b8dd8118ab63324ee40317a152761578d493dddaf48892bc5fd05ee609cb7c4d922dea93fe605d8ab28e1516861c713ed15bdd6a578d (encrypted)