# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
66ffad10442d5c5dce574dca488dde9f1eae24d75e7d46aea54065e4863fc67f
Pseudo Output
b8db8b729028a296b2352a0b38d2a1b92eeb09bed5bbebcba0b318909d573004
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
769b76d7f6f8fd1621923b06f2f618029e52a7b5f1e7950df2971b29d6f6274b
Commitment
a6066c5db7e563ef26269619890d4153b5032d810c0c802cba90e60926165f37
Range Proof
672 bytes (Bulletproof)
Memo
011e08d0c0b4bd657544b3f924962a5a28cf9b53ca1af3fb581cf7fbe746b4216ae48107549d641c31ed1db09f78e77e6d45f718275b1cab4ca39f3a5f3c809dfba81710210854604cd1ac20f6e471419abfb0980f6b10c2ea1c17503d9c5f289e8374725928e815744df4f93a2f7fe99cf18ffbf27a41482d3ecf5d7861e6a0 (encrypted)
Stealth Address
8e8b70ca58fa9697511264374f8b861e212184551439e1091d0bb90eb9409f26
Commitment
8e3b5d9f210d0d260b1f3d01e197fdb508ea3f0ed935fd0f84220cd8410e8004
Range Proof
672 bytes (Bulletproof)
Memo
c8a0cf957d132a70d688b83ebebbea5ad61e8cd63daf8d34dd0e95500839f5455c3ca235ef7d28f004a9fb686505aee3cb4a83a33603609c8d2ae73b08169eb8f61e2d642a52484f1b1c4375f97389e8c4604f80395661a57103c110af7cddb939e9e4cd6ffc9ebc9746be81e549677be1ae7e001e4497316d119157cd5299e7 (encrypted)