# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ea1d5a7cfc2e268c1a8642c33f061c5c1f06079b32f6d7686e0630aae7cf5c0b
Pseudo Output
568a43b4f9702eb0cbc8e4898b281dabfb28fd084d5d842c1e395ed14e1ff844
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ca47ecf6deff30b027a5753b08996365a1f29af8a2fb8a01d25dcd2eac6cd167
Commitment
ecf65d2da201345b8fb07a701889fc8cd0d00c068b65a703b7cd72f7da2ada5f
Range Proof
672 bytes (Bulletproof)
Memo
3e6dd7b2e201ba02ea13d6e70e2e7dfc90e089727d56f3b6585e6713110c100daaae56235fc586312c28a4075afe569f9171742b2dbdae3710b82e466d16031f5de09af319274477dd943377f5d7396773860ea7fdff0839918c47647028b3dc1e9bd3f9184e55fcff0ad5105852ece68d359942ef3b64dae1b4b268d9609712 (encrypted)
Stealth Address
fe280042c4011b01be5220efa1c17fa3020db69ebc2e9a4f2d81661e5a3ffb44
Commitment
d87f5b39c59a73fcc52f8b4aa2eb3498cd092db0816a237c9fad5cdbd242db64
Range Proof
672 bytes (Bulletproof)
Memo
c460f55ce25f6181c4ac892b8e8c9677f72647b131dfc02bd1ed5f1681c84cbb8963b3ff62eb64cfdc820a6bfc10e9d5bd67827c9c0eab6d4d729009b257f51b762a6702ed61fe803dae3420797af5d9ab7840c5fabcbe4ee24bdfd4b45f1dc0b00d89c26ae354d73da9c01825492ba5e59c373a9c87d3f9a9f6aff64dd73d9d (encrypted)
Stealth Address
5cf6aceafad235ced9a6bf59fd8fb6b8bf4e241ade9cf4614881d73d151ec05b
Commitment
30f86f7960ceb907a8c4ad48e26d9460fc9883214b23dc204ca163f295e35a24
Range Proof
672 bytes (Bulletproof)
Memo
70fb57189e6457cb52ee1fb7e4d5be2b3c5a3d7a7d05f088be23981a41adde05c4be17af61a76ab7ea97ebd3ad4e2198eba783a7c318c75cc83e2138c2697b30baab7791eb1c47f76fbca18aaf97ebad78122ce1e872b48ccc0af2e718217fd7f10eccabe4c0108fd0ff723bed78fa92c7439fd0903204a654382fc1c46abd4a (encrypted)