# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ca3c3b5689a162c33e06e78beae6d99b0c7e83aa7981a5c36511c4a7334ac61b
Pseudo Output
d6c31bfda1fa56793590e9dcde65d64390ff4f8125caa6dcc04ce0f833f4dd66
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5649edc4ac5171fb8b577f1b51c501eac52ac305c3497a543c451ade760e997f
Commitment
5240805349f43454fa8d66dd5cb56172c0ee776e09c9e42a7449164263db8f7b
Range Proof
672 bytes (Bulletproof)
Memo
e82496f5c64e4d9a2ccdc79401c577a6b4f496151424e2294e3fb553500241d18b2ad30d035e67963754b8283005b325cd9e620c877e18b132d49e9be4a18a315b3c5abb99e5dc8615d877c7a054941987c8d311f431d272f9aebb65af3d1f686cf6ebdc6fef2f3b1c0a1b0d023acf4b62939499298b628d408dfaa04a81630b (encrypted)
Stealth Address
2a7417a353304b960600009e751885c1cfa89e6820a2228393dd71258df15d3b
Commitment
4281259b8b7af25a51fa742cf526a9b13e21ce3cfd5195603303016e0d58566f
Range Proof
672 bytes (Bulletproof)
Memo
9b5c1794b6a6655261ef1f0c4cc115f6c2ad0de5b6ec5cad67ac9b1eee06fca23db506686c91fe06d8d5383866097268c97c47dccb5a2472449aab21a95967dabdd18a239c107a29e4d4a811af1b2026540b813475c833cc9805501754221be0896e1bafbb07fb6861178c1559747c03280ca641c5e8fb2b33d353f5dfc3ad4e (encrypted)
Stealth Address
641e114da0de7ec597867c51ac4c8b97cd14316323804bfc03390784294ef36b
Commitment
d8e48c7cd2dd68df13fcfc09abd0bc831dff0a2f11228c5fc7f8d5d5c7851b1c
Range Proof
672 bytes (Bulletproof)
Memo
add9638d90c55bd66dd348474dfb658bd494e5b23fa84887fab9594ebe8e83a7868cd8b46bb797005968db8e6cfc66ff08626c120ec5a905bdaf25fb82099b20316963c2dcc2d0708eee1580de70969180de8870458fc39623c7673cb1effdfaaaedf7748f670be5db3be950c93eaa428876c859aee0a4ff65528701c0c42800 (encrypted)