# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4e74ad3a2cfe4e11e72edb689eb9b0427c409b968731c28076d528809ece6d38
Pseudo Output
8aad05e0225456ae02b6c0bce7448b464606b2615de08649a8ea6e38f5e3d861
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
04027066c2d7f07ea5a87d24e05c73a808ddbe957c3923c535c8bfe303641a44
Commitment
42c9819111c2929f56fa0be6b8c0459da18fbb60b66e9db46c7d8ce4470ea040
Range Proof
672 bytes (Bulletproof)
Memo
8a689cad6b202cffe62df29603ba170eef5e9dc58b50d0f67583400493c01dbfb49441643b6a269ebf667d6b579f2e8997e85ede77d9d7ab18633d4d45df09091f63bc44dc0b31265da98daf7b84dd4879cf8bf67161800693d82fd865763c3cc5e3192a149aef09997d5cd4a96557e64b12cb8843e88d9eb074cf1ce7f80500 (encrypted)
Stealth Address
08c2b80062846c22ff51bd765e44d3f420fa11aec2eb4afa2eb087bb411f406f
Commitment
a2c5b13141bac6f0cd458760cb44cd76055e13000d0809dcca8f222368515e13
Range Proof
672 bytes (Bulletproof)
Memo
d5b4d9dcf410e4c40829ae3e76d03294f42210fbbfc358ce2b94bdd5ed50330196fe03a33d326677b675eebe18e2c8273aa8ac8b71e12e0eede4706942c178b4826b22df3e13a721e2cb3c1b8f485b7578a418bf0f41c436fbf4903b0df45ecc439c2aa19518727fb714203402040736e99adda0d2fc5d4e7fbab85b30e34a80 (encrypted)
Stealth Address
6a5c9485b07cb39a8dc42354ca47b410399a6a3af0adcf04ae5de78b4afdbe0b
Commitment
d2cbaefab4fd0aa3f19a4812f1e628cab442b86f22115f55153e4f330bbeba29
Range Proof
672 bytes (Bulletproof)
Memo
04aed07e64ed437322df238e058496418c2ed60ee71645fd27971e356a5969866bb9084f8ab9a41700134ebc42def386136a869a421e0588d89d90acbdd8072aa091c506f6b1812fa9f5f12ea39a0a4775c4c357bbb747a61d673745b50cc7d47cd79869a2b0aa58e7646d6138e65d4cb28e54f18185041399b6cec05384e8d6 (encrypted)