# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
66a406defa017a15a1863cbaf7c3aebdf78231e179583bf5defa195a1d892230
Pseudo Output
c45fd1a487aed7fd416ecbd2671e39045992eddd964d0108ce0d83c50c540a10
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
deb1f0a72a6f973d5d73d5b6eeab23a495b2c79852cbdb75b0eb4fcbd449ca48
Commitment
003dfe65d75f4725c8ba4cbb5de791f9f8b8757edb63664702e17b3e46469117
Range Proof
672 bytes (Bulletproof)
Memo
a1b5479bf61b60664ac54d3995c7d5ddd04c205bf837f065d245712d55afcc404cd5ed2d3a54b14f64c3908247ec4e2d07119c99a3e4bac1c486efc7f6d4793cf53a462526aaa53ffd27bee77a46930290986b771f2800d8132cd8116cde93223cfbb97b0950bd1c39872ac5e2aa1a72b2c32216ef63344b7fb283ae4bc9f630 (encrypted)
Stealth Address
16864c181dc0192a2b7b3276beb08a2dcbbd279d3e98c31acf143b46de1ad73b
Commitment
8e5fc334fbe6bf7b5e2daca21e70daea9a67ae9cbd5bb6f6fc496f302442fe55
Range Proof
672 bytes (Bulletproof)
Memo
65af208b15035df6aeb9a942bde0613fedeed54d2724a672384a69f5faf06eda6c35918a20b390ee3fc8b56d1135670d613be5b89929ef39c9343da91283ff370043d01656d1973b5bf121ce925afa3f469f711252d0c8f4b12f3bd7c2247db39e6b2e9cf846781be44d07a9407c0743b749c9fd442730cc019f5fe58f65eb7e (encrypted)
Stealth Address
a2f2a19dd4c69419d31030f6b0a0c0e250886472d52fde140c56746f6387fb00
Commitment
9a7772ebca0371918cc3a2432de42bd312a38cec1f820d2ee9b58975eede6a67
Range Proof
672 bytes (Bulletproof)
Memo
72f5ce2b99db58b73acd417dc32adc8c15b0e727cf725971ac8b60009b33653dc2c0069823fd3986658add939be6dcbfc3af87e7aa2e887a47b5c74592c5e005d3d9427449f5a13841dd4e03872f160f266f28a5914f390c4a038270fd57cbcd043815f35fe6f125a3f16caf99b805f1b058968132a0871d2229b54c60cff99c (encrypted)