# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d008bbddb98d10e684c2b021e0614fae425dbb89a10c49d5f349c23fbc3df574
Pseudo Output
862e8590194fd052cf27e55e4be2b4596c8b50ce367cb4b2b85656de06dde17d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ca55d931fcdc9f88aa5f744b6f6b5f9615a7b49e61256c5aade679571fe6d804
Commitment
4cde083f047343be8fafab30729d9cc7c6e2680b1379419dd4a1d2a203251222
Range Proof
672 bytes (Bulletproof)
Memo
82d38dd87cddf9611440ef5d24ff6327664fac7aea5a3e089c1208e584c395359e1f027df3fd7e953e4fe90050c0ed6f0aa8fbab10f6d0e1c6b83ae3233a17713d226bed1e00af1b6c0a11a39f2cfc47055850ce8c96b345e5f7e5c37ebbc45a4774fa5a89e6b81a34462cd2c27101dd913bfa5009587175937959a28374ba84 (encrypted)
Stealth Address
d0189660c0d31fe2474a05e623618e490a7db0aec67efd24eb3f93a56075cf4b
Commitment
9afa86722dad52132ce62af3dcfd942fbd6c0edc472aaa1dc6f8b647373c3501
Range Proof
672 bytes (Bulletproof)
Memo
25dcc44cc26e8075640c984714d42f75dc68cd03fa6af370540494c6738f4f1b5d1d2a2b914e1093d5451b6667b487a4e88568af5284329f6ba08c98a48f853af026452cfe7e33cb8c397c4df1c3803c9f13e64b1ac2915e7b6bee7b39f51b4044feb045643958c64ae0c32c34a26b0ce62c851651f0a35aba3bf6dfcd097fc2 (encrypted)
Stealth Address
90fad66dae84703286ac9ac5beefc182fd9a9bbb0f4c983b47c6cbbffc1f7420
Commitment
6c23c095d0c00ddd88e5fbe4a25b82bbb20bd62d16256b411dd32cf16a0aa903
Range Proof
672 bytes (Bulletproof)
Memo
f35e696238ddc8c34d0d8141c4d3af1c37bd6279e786da47852f18e174411110dc201edfb4d0d26adf8994456e926fe3a92d150ec95482358815a0689866b7661c41ecc1ed891dee2d561d6b410d1a664519f53034aed7bc661990da60d684c951344fe5581c99fc0e30bc5c0f6188052385cf09c983d71fe79412cf604b41b0 (encrypted)