# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f8807385e1cfa2cdab8f4a0c1c12ad28dc8bf4286a4ef1ba4263ade122f32850
Pseudo Output
688f884f174a8ed3cedad1ac87b7156db8ece81c8228eb244b9ed51d4376a333
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
caaba53547eaeba4511139b611ecc25c5f81fbe187e18d8103f5b6518b567b2b
Commitment
96f461b8669140674a27b00322e0737218b99cd3de131691851e0a1a21c67f04
Range Proof
672 bytes (Bulletproof)
Memo
c5706dbb1147d6294f3dae3e4d2e5d2b10fa3cd82f345cd5d8404b88354549c263539f1eb3f2f915a44b233ead73092cf5429fe348914d9aec1a987e0b4abde31363ab20ac3f26fbf0f717ecf19012c4fcf359b54004758945a0eef67e2e8dbb800320cd407ec4536fe475dea5bbea7c506812d16a80a39cde04568cc7dfbdbc (encrypted)
Stealth Address
2c8b6f0bf95df069221d2df168e74bc15ca9f97365f247ad47c9cccc0d10c57c
Commitment
80a6cecbe8b9b059bc07169f2c2814f3cb0ae17e5038b9032c036ffe1f73090a
Range Proof
672 bytes (Bulletproof)
Memo
c6da562ca7f3bb85bfc417a89b25d7ed7bb29123be74e9de0e3c50b97d3a9bc842ba5757baaf1a9bdb8fb40745f1574211845ad7312db98f90104bbc09d09816221185e5f3fced19814d2987a203d571f87b6ab7cbca67cdc6817859cfcb179dfe021442111b058a94453fbbf41bc7e6b5bbb421f5e5d4e72b84cac0939b7418 (encrypted)
Stealth Address
361ca8355f6ca10faa0b53deafea400aa2d2f0d2ded89a3969963995e2ea8d58
Commitment
50c525cbd1eedbeb7b70890a8034b9eda6fbc2e2653ebdecb7d4728c4f269163
Range Proof
672 bytes (Bulletproof)
Memo
0cf76e88a491a256184e6edb8598ca5daa1f0d2eaff66ce1d9a79c89c775c06c5ecd7a93649c98c82ff1ce0165e3155b46eb2544ba35b82548e15003afa0823a2548f3cc9348e176206a4e8e29e61a30ad4ecbf9990e24331941c8a1fb59c642fb0882a838bd260c1c20bfa46c40901bb2c8b52d5a50a6f4d0691b492d643ef6 (encrypted)