# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9818e2ec2c72db06f25882ac0117e911de2e55623e0a23bf3468e0b989187639
Pseudo Output
5a0896c07419729655fd1345b4460ef23543914214d8b0bb5228175d11dc190a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ca913f3d556947256fa52e06b3d88583d87e133c5eb0028a0ca181200ef56333
Commitment
7253343d3aa3ba9809286b5b0235e64b43c09314ec40adbc1f826ebfafc83244
Range Proof
672 bytes (Bulletproof)
Memo
ae155544c78ea592aa8476d343bb111f42c221f372421bb029e9bd00e549af80cca1f2f45be000c9dbb905215fe9e969538abca8044a0ecd3fe9e371bffaba2474583a8e974c700d3cdaeb0400b30b5d1fe563ab4c81a7a284a69a11ec6d9262285b2f52a2ea1eb667810606232debeabb355840323cc5d25261d17db6d85123 (encrypted)
Stealth Address
165204dcb1144df2bd30635f81ad961ed29bf45fa6b85dceb708ab9ab1092315
Commitment
defc83015e1940d5189e2d0dce65c696a2b2f04dd73363bbed7c6334fe3d1739
Range Proof
672 bytes (Bulletproof)
Memo
7099cc54167f8d144783b507f91b08c138577c4593146422a3d737df549c018a36a14e72af796e1524db7cf46664e78879fe1f62623a490e66bc7c511316b12d30d00c0ca4bee5a3952d2f2ef08330a3d861741a20f94e26c2b3debae1df2dde5e3dbfaef297074e34212a7c8068d7ec81c848a861c8db4617f0b45484af94cf (encrypted)
Stealth Address
dc0865c24373af77379ef70b95a5c6b66c372c0fd0fe7680cf79a9444b39c307
Commitment
a0b8d05f2bf476ab703927bbdbb3c06c0e3a8e47dc71aa94adcce25c40a02b68
Range Proof
672 bytes (Bulletproof)
Memo
d967ffa03c6d86c0dde8148748cd334a4ddfca113048f9ff0463e589a39929d958304707e12a79770454d30c5b6fbd9cdf25aa5db676b338c92307061999c1be8b8f42b964ed1518194403def8e937ebec2a891b2778dc2f7c3ac912e2fde6a2d0ef006636c130228513997978d6c35d779d72478cd72f84467cac11f4bd5e47 (encrypted)