# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1a8372c1645f1c26d05bd8a2433b118f6460e4d89ec98fc7309899e505468061
Pseudo Output
fe56930ea0744617aa2c1ea76b9874791e1f5003a9d252e6484116c119e0836b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
066a1ea8fec3b676cd50bc2befcaf5edfce4789d536c79987ac68e61fa9e172f
Commitment
26aa449985bed5329e9adc4eb0af55c5a94407b5b9cc76e64f7e7a8797f74129
Range Proof
672 bytes (Bulletproof)
Memo
ab5541b1c29d179cd109ff8dfcd6c19cf238ddc76b54e5e6fd6f82e705fb506b1ce885e11e163085cf038ef36398c2df5e5e8d2fbfbdeb4d7e5863ad23548ed5c1d3a5e0f74e34eee431aa1f4b4428de9655ab0e7d3475ddc42b52a3da8e5821b2363d016729ad0e70e85e42a6b408deec4f1060f2021a773dc603870cceb881 (encrypted)
Stealth Address
0c65a197635d7e961a542217c2f28ef77e95effefa3a4b36743e6bfae31c925b
Commitment
1a92803031d95b59e2c29248906d84148ade5afd7b58792f9db17898674f4877
Range Proof
672 bytes (Bulletproof)
Memo
f7cacc2fee7371fdcb227ee9bf6f1fd61360a0737b9bd6922d12820b1c0f3ffcee36400a08cebf66f17329930e04135b5f7836ae1f92560472e0b108232c14a99d4081604c4156673ae3af89a756e05e4b9b66287d239c2e012b23c14c2b246103bb9cd287d7ee8daf265bce718f409204c48ca39bdc4e47c40564af0c86673f (encrypted)
Stealth Address
e2e024ad97671dbfcd4080c83a00b00b5cd265d646f4a7f2db3d79f7adfa806f
Commitment
00101139198a58db2143fe2ca91fa9c010590a9a4b52138bac9690e40acc0465
Range Proof
672 bytes (Bulletproof)
Memo
7736b77cac97262f06785ec37016d37f7807b6d58faae63781e3e913abcf89f292a6daae990f4e118c10415dd1b4fbe824140f02d84a7649fa81048d5e03cceaca498748e4b9c3a61fe561cd3c366e08a0bf1cd4f9b0018727437ddcf51e6e5bdc16f67d00f03cf1f3a3845ca5ceb1b05f652da744e699e4052e78ea327c7950 (encrypted)