# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
98d9e98c070e1e70625148c3911e3ebe8d09467745a94dc2f1e57c2ea6c3025c
Pseudo Output
189584dbcaeff1af2a5429b5146facab5b5fb15d05edc3bcf769fcc30e76f52a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ca048218724c04660d255554e17e5668174f053ccb490135978c82c174260374
Commitment
5483be16393b5317dab639f825ab582a62a78c9163d90158fc689c6b9e55b835
Range Proof
672 bytes (Bulletproof)
Memo
f906454bc4e3c1bde58fad725e6d3a29d706b82263e790871dfbefc6e743168986b90d94862b4637a9d8993e2a89a378e3e75e4411b38b088e38d9ee835370f5248fbbfd6ea1c0ba05e60771168184744a908ddfafa12d73214cefdb9b0807924f23ca9d211ebc72c65658c5270c8a4545d3540037dac83bc32fcb64c135d864 (encrypted)
Stealth Address
3e5763a4b58edd917b1ec445278cdc574ba2fdb3ec8f9d791c7b133b3fd7e546
Commitment
9448b9a6c7dbe871e66786c0aef7a9ca9a970396aa318c1fd7b866cfad820270
Range Proof
672 bytes (Bulletproof)
Memo
540b526997115b4c986369851922c16a1b48a5e6635f3b3daf2b6721aaaecf8fde7eed5f5bcfcd11fd8f2b0681ffdf000bd63b8be723a2c1926540498ec73886ea60bffc36123d3b33ddbb049249efc210b46811dbbf6242f441b0d717f6e5ff50ca4b8b6c77774ac79b90cc008d1cdb80835090dfd2d45dd27d791b98fced17 (encrypted)
Stealth Address
c453a5e9774920b8a402c3800b0f6017ec8ab5da5e6579d3ed1df7315e2c1d05
Commitment
040dabfa4da9425d29039b82b803656e4f6426eadc73a8e32c26222e28d46072
Range Proof
672 bytes (Bulletproof)
Memo
6084dbd4bf0cf0ffbd310d1b812a15700dcf461a6e775ae479d96976c731f603c2c63616861d5e57ceff027355a0b54f29e7ff2835dece6fe69878c4f27cc673e288e111fa07a5081b02645c321af247f2ccb5e28ef8c2e0b14539e2c8cd9089d1141d42c8d04bd2a2f2c1af41a0e3ee6dc3f22560dafd247f13080e223f9146 (encrypted)