# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
02ab1988adca99677c8bce5937a1385ee9e9b6b66277144c35871420ba5fe640
Pseudo Output
806f6e12d9b41561bc68bc11c5caf5393f083305b36c0e838ad916e31336fd37
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ca495f2535ae36da158ab94be4797b3d1291517b5cf9478b04df9a2ea9790056
Commitment
8464c68913745bf2a6f47623e0f54bf48ade9959c9f3e40b4b7dc7747f8fb222
Range Proof
672 bytes (Bulletproof)
Memo
89daffcfad7bb713d9d4c8754b3f92f5335bca86c68cc17366055e6d368b48dd8fc7241d0b9f03282433c3d3366c5d2fcaf043e66e8fb9f498bc4cb63c578263db79e7394e619c1b404b18052fc38bdcdac4ca4e25bab6c08a522fa7193f13428198d85e119aa52962d6c3a3b41906f3e2d2b58ce223fd12205cc422f5d02b83 (encrypted)
Stealth Address
1c5dcadbb5042df162f4125ff61d03db96e4e5ed9c477940ecce8b9b7cf3484d
Commitment
923da8bc546041d2e0f5801f32b985660961334def08cac5fe7c45823cddb420
Range Proof
672 bytes (Bulletproof)
Memo
a9d0dd0155514468ed3732410468cbc9ea8ea32b3834c1b3d68dbfaeb12e0c47ee8cbfe9931a95d38e8bb9d79aae4c2b78823dcc4124dd92469d47eb87074183fcd3cb1b26191799174cc21694c2826a39acd4599f3bf4cb3d6669468837327dc1b11ce3c4775138021c9edb5936a22ad85057ce2a8fdea7997dde4c5f2e37c6 (encrypted)
Stealth Address
a0480f9248d11e3c646c6fbe718185a4affb823567d0e680c48b7e4c4bd30913
Commitment
e0ecd4bf6578a52e863b6fb82d4f2efa43e7ab0c728d9e177a8577b35174082c
Range Proof
672 bytes (Bulletproof)
Memo
efeafbb0d10f97b261e6be469dc658535f06b2691c57dbea18f5d6d0eedfcc506b67612ca420a232ca30951c80275dbce3e84be0a32bb4ea0c8933fb55b8e3a3a23b4aecd3dd0765de6f0efeffe3ed89a7142259224f1f7726bcf4410845a1ac346ac0ab27964499095c8807b05ccaea47a303c547c6e3a51b3ae3592549b543 (encrypted)