# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
48914bc502db8adb40d055ca421b23e8972913820bb0316e3cb2f0ebbf61a93d
Pseudo Output
d0ac41890d76d83a61b34ece0636e8f45e10756344b1f0a6d5ecb9dc8e776138
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
66a5267b990a9ef8df38e9f6f6674bf96141c13d4c152a93a9883799ed2ab857
Commitment
2e68d8e279f948a87ae60f56ef15280f59431330ec7215402ec85e4b42e42b59
Range Proof
672 bytes (Bulletproof)
Memo
ac4a1b632ef2d9a956358cca4b126ae0c01dad86ca7480c3ec70a4ea087bdc945891a7b762519236d37c7d203f1cc6a6262694d1db15f22ba331f40956d0c4bd174d1936f76f55a6e79d831f5a098c6f9bdedfd65ec6a95d7c60f16609b7d73a132e6916bb18857f2251013005ca805428ed06d9c2892bd2ed9ce7d5ca963137 (encrypted)
Stealth Address
565c630b361559b3f9b65c93bdee4eb4dae50383e944deeeb963dac551ecd904
Commitment
b036777a2c523a80c57026bc370d5dbd16557d40e44df34bcc463fddf4d3b855
Range Proof
672 bytes (Bulletproof)
Memo
0be7ed230443deebca8b31643ad9c1553f853b2f08b3d299987f622f1e0462848277b98f160a0428dbab519d80a052a9aa6ce6a38eb93fa44f8756ead172934a73e8c1426947fe81fe7ca99042e019e01eb6e26f6bcbe64da10946c78c5aa542f5e82a463637b0ca276fffe4d7f6f609b073b17e7263602efc6afbe854be1992 (encrypted)
Stealth Address
a0e72cb47d2be437acd0b29da5b25e376b49e300667389d3c412c74b99295e7b
Commitment
5c1b5e5cdcda22343f4453fcea04e54943ebef3ec6de48d55fe29c60a2a81901
Range Proof
672 bytes (Bulletproof)
Memo
e3091d58d8a2506a3b8fb00ed3a443d6857e5afc2f1a3dc6af30b60270ff902ad683c2e17e593dae218f38b89528ade5474973bc286b4fd82ac8702659165cb0e115fbce227f85a698382a0a47ec15a6a17e2f05dc717b30096840f05104caa444c047e230bb4000a7f63d88df6793fefe73515eca996ffddf0453d9b3c7cc25 (encrypted)