# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d2fc991b71c337067b2215c6eb5263155d778aedfb3d9f2ed56bb24eecf74c00
Pseudo Output
a67d555794a7a8156e70812bc375bfa5906bf6e4e08eccbd720532f8114f5e03
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ca8524ee997fc5139b5d1d4fb3e93a4b6d68d3b09512e5263193b6e15bc14739
Commitment
d0af6d468077cbf9e02177917e5d4860d09633e5ca9fe7ace052747686729911
Range Proof
672 bytes (Bulletproof)
Memo
78c4641fe364a3b1c02b1e0cfe834404f2f435ab15fe24ee673eb5e4dbf9f55d4ccfa27080bfd0a448a65dd093c45c73350ae3b08d3dea32c7234d93fbe94d0820be221cf3a1032a984605df3556fc8c72f3bcafe205ff4df3b930527b518d735de76e163c2014f48d22962b47d5e082d68fd497eaffcd952e7817945334a626 (encrypted)
Stealth Address
22f2b36f46b2480e023c74b6e25492f9d57e3c7748a71c0261a3847a8e913d31
Commitment
7edae6d38b51e52e3260a42ed2a0daac150e018fc1c3972b087b9a3a6679131f
Range Proof
672 bytes (Bulletproof)
Memo
4038e6a352023d85bcd75420881ad64f1f6a36aa4a3c55056590a98fbeb8f5ceb78586f40f6c76b470d8e82131fc0a077d23b5d27c4f8b4456fc687cd453281f561b70e6cd37a95904afd00a46e5f02a00173c355d4c96cdd87df6b19a3e83e0d569de3c6732dcc11bef7bef5699909c8f6aeed1f7b42b1b67cd95f6ccabf2a7 (encrypted)
Stealth Address
428af815f98254f9533642cd2a165b345bfc97bbeaa5d2424b7f3dc5e892615d
Commitment
0c3d212ec331e705fd6cb6bc7d9ee9c0fba60422e5e6d8eea3319dc131ad7c17
Range Proof
672 bytes (Bulletproof)
Memo
caa6a28bea50823fc1109b2ca2c3da7e6c2918a717b0ffd5692f285c0ae6ad082f18597b3f13a3409edd6ecb133a94e72fea1a7b52c8ccf5495d877cfe0e92f1fe8b50c0e28e0b71658d7d1f8ae9af48d141c3f2c92ebcf56a9228df56febaa7224624f3663af3f740841e70f1706dae04fadefe1cf76e2bebfb546e65c687a3 (encrypted)