# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ce1fe22ec54c6ad9d7bef2ee73d9fcc6dca5ba45832c3e3077ede0bdd5834501
Pseudo Output
6cf97684db968e295c6df40a692d9809d9143ea73ea90aa357ec3ed38a07a46d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
caf0a33725f4af4f21666ea6a970996b5d34a7f4aa342d4f157ecd5357d0493b
Commitment
5689dbd085d164541f6fd6f4effe3507c82ded6871a0bb004c149f0042d65352
Range Proof
672 bytes (Bulletproof)
Memo
074e15f47f687d7ccd161e1cd7834248b95c976ad381109a26a97932ad30044edf5e158ba5943537e7895194af04a17416e23806e8f5169e6f2d61a6f403cffddf3410b9a4bc0139a386edd2c7799e2384c7313ce099c4fcfc660cf5fad1cdbff267ad7d4a6253b472aa6b28ed0626bd42627545a4890430d5ebd9f3c451264b (encrypted)
Stealth Address
00914617c4889fdf493a80deb3bd2e61a7ca9df378f6d92453d49e9bfe4bcb36
Commitment
02e3b20f49da03edc3d26b0840aa090b5d2b95eccf4b3e16014d0fe9b95af058
Range Proof
672 bytes (Bulletproof)
Memo
739ae690eb023d623dedf8558ae6bc6c6aecd3586dbce24ed302d4fe29657397f054a595412aa03df21744dff972f06e0590fd42b05263b152e8ed7de31fe29915110483041f36d18c831cd8fce84d300d57cbf66fca29f515914ce7056783de8aba9bfcaf3a340558e525b76d7c95d9c42f25191c98bdaa3d6a6a02f79031c3 (encrypted)
Stealth Address
f29171b46d3c7cea40248fe5940d297a4bd7957e4492e785bdd49bc5806ebb77
Commitment
46f563678a27ffdb172e2e501f46945f5350d3495f2bbd04bd7bac4de1790b3f
Range Proof
672 bytes (Bulletproof)
Memo
19a6b1a8ebf3f77baea4a342c78ab9dc9ab5a1659303d96b06a8ff6412ba396ea7be3e031449518f9c9815fec06dcd9a81eed30ad4904f5d3f9f7c03ceb4710f931fd9d81fddb058246194e1eec76f10cb8f0f3c6c383d03f0a323ae1119d49b66a55535e1c5c8b74f39cd9048c2b0e0d1787409ace055b0d5268ecaa5583147 (encrypted)