# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9cb889aa86d0c464ca1c99cd4b610b460035b4193bb95fdd821f1ec9ae5ff077
Pseudo Output
e4df01d1db6e7c37c1f04acf89a74d080d4d9227565a3b4f7eb6e57928e9d930
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
66daffa4989b7a6c900232df1ca1a47f7a6e3dd60ae4a563584f383237d27d56
Commitment
72bf760b8af5f11f595b28704b04b9000f0d96a1bad2f7d0bd5504d85c3aec37
Range Proof
672 bytes (Bulletproof)
Memo
607c30e9edb430d909dd069f06e83c8161514a6f56f15fa692001b30798168b6f26ebaf9b9e9340bb30a9a8c8331b072c5d4f4b40842ca04a41423883fa0d3d8e626bab428c22bc309d4dae8e4c4d526d2f50b05ff5a5e196841c0d4fe4a217d4ef65a8fd74c2217768bf77b3e5cf63e59ff54f1493cb39177e9afc7fdbf7dd0 (encrypted)
Stealth Address
6a16834a6d288c11ee075f21da34f90f8db0d6d4cc5c703ebf17a95041c72522
Commitment
80ddd946185a158282177661cbe84362614dce4554a5c97ccac550315f05e074
Range Proof
672 bytes (Bulletproof)
Memo
b0a44d14ececce54e6d109e9e9e2f62c8c3d04097d7046de505603aa5e224621c00666004d5fd229e79811c89e9330719c61d1149636c6a0aea22386e79c351e128fe8958653decf49163f166a294da1e4830c5f962a6444fa4819cadeb459fb9139c15a7116396ddba502f5a7b14890fb93702672ae8823aa95aa4600115e89 (encrypted)
Stealth Address
a2d2bc777afe878c3efb880057b605364d1a521520fd0a0ad6c0bcc6e4483549
Commitment
18e9565092c034c648a2f8036e44cf5b710bb2ec7bd38032cf2b29f44842cf48
Range Proof
672 bytes (Bulletproof)
Memo
ba39b598fd241148a20953dde3dbf45af48e920631da02f310a907c8f0c8e2e173818ac785d3737a5591f6ed37992193e829b456b8c7a0f6671dad9e10c95821fbc3e1b8ce024f5fe7b57ff4657ac39c1b2bdaa9c9f30f8d6b2fad9fdd26beb641b0040599aa931d237d28b47b637b19f62ea66f229431ff3e812b4f1f45fc06 (encrypted)