# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d6d638b48010c45a1753792f5088747cea16478317876d731de518769e9b8825
Pseudo Output
6ed3f32c9364108b1791f45dc4940f8a6858e3615df7db325db95ff91128c46b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a66225e0dd2fa7adc1a99569cace15c0ddfe5867ed7f9b730327ce68429a2f2b
Commitment
e84660b9485d84da6718b3e39583dc28197873caca45d8234f1cd6d3ee37327f
Range Proof
672 bytes (Bulletproof)
Memo
65a2e9cf0d6049f536ca1840477f07cf8fdb2a3f71912b2cbbb38d959022f2ff4001015e9b728e5e809c2ea34be9d7cead9362eaa50f4bc7f57e61516c74b7f469098b924141a494b5f2128ea3e701c5701b9b7fd8c7d811fecdbef541d3dd1adaf9b3fb1958bdb32bfd3fe02b905b1c1f11d2f71d9adc509877bb30639bdfed (encrypted)
Stealth Address
8e90dc2b1cbce52be3cc2f89d415867c7b51d739bad5fed0a1b83503e9a19719
Commitment
92f0973940c28b8b217c14564dec80265dd76dec47d0545b9a9d8a87779f6f2b
Range Proof
672 bytes (Bulletproof)
Memo
1ed5bfb7e1ac52a20f3be056ac5debfafdb3032ecd9a97e6430194a9461ba5bb6eb0d0ce8c2df0904bf8be75de21265bfae25a83edcd976d6c298d80b62b66efe4e973e7146da16b9ab2ab7b5f4bb66e359f312e3707a6324a85bb0926ad0c5fc3f832e73cfb5b45941fe38294d502cd5577aab934c941b118db61ea237c444c (encrypted)
Stealth Address
48fed5a6dfeb23f3db352d2bd2a3493f8f1b93244df7d08e0c547f1c25b14c3e
Commitment
e006480d610ec78ebba965b9cf2b373a0f506ea6fd2d82b363c717c5028eb709
Range Proof
672 bytes (Bulletproof)
Memo
07df71d70a4f83d8287154eb7ee48ec53f143adf0dc7ff6a357749f58e7acf75398391dc996092951159bb63a5aaf1449e069f15b1512a64010f4d16cadf55cd1068129ced9a19894d052f9baa9ee618f760b571edc8e30e628699cdb3baa9e092c8bf6a531f8f670a4a5245c8720d6f0697b305e6ebb44596645a155424d07b (encrypted)