# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7036519c2768d937aed0936195a382f5102d919f01ac740efddff0796081880b
Pseudo Output
b225485b5d18d86ba1ea981deeba9aa692302a618d671eb4efab6966c4cc603a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ca002fa8a51ca935dfde180f8a93193539cae504b61cf15e8620f0502616f14d
Commitment
2e4bdc64484e5ad0171a79a8f3030b2eef203471663a4bc49506ea862b2bd174
Range Proof
672 bytes (Bulletproof)
Memo
962d4dd6282e75237da2f2cb7b9488b892b4ef881b9616683b3934973ba2c32d4a56c70a7d77966fad23a3172621041f02753c3bca8494660f00eeb2db7998fb948a9c14cd033c81cee3a8b7f5a3150b8b58b08defb74f6922a86c07d35d3df0535013e84cf21dbd1f415eca77feae4080954ef88cf718f817c6f2365dbdfb97 (encrypted)
Stealth Address
2e1c7f11daee16ca4552dba6675f3bb42c182019157863161ae6016d3f224927
Commitment
f4010db20446c35c9e01f94322ff63ff6242bb060cc7fa17600f29a1e4a6d901
Range Proof
672 bytes (Bulletproof)
Memo
4943000e433143fe2dc43448b6be4a2747c5f8970e98186eb8a68039f5522f0834fd70b89240ef76b0264d318f9cae3cd16323d22605d1bcf7338d140730e1f1c17749297212a0ec13f5535cd79a1657b87ee5b9938bfc5fe1c6aa8928a77452b64e35135fa28a07b87398267ec4a9bce41292e4114f1a04fc3b0195d1a691a3 (encrypted)
Stealth Address
c8162cca3236a1b967d6fb07fc8cc4802fd3c339a38cf85daf5723db5c693d1a
Commitment
8228c9d434a29867cfd349550913ca8edd31a78ba999476eadcc2093e2cdd23b
Range Proof
672 bytes (Bulletproof)
Memo
ab70007f7b52fbe71fadd22d7394817bc01f4e7588543fec45ebd9e9fffca439c18b6d3213c8575a0de67eb3fa3c42a540512b4fa26fd123bdb902fdc0fb8bdd249aec0cba2304e55ab95d6e929e1b10ae41bd228edb242a454c285adcdba7bfe1cdd63764f01ae2e0758c49b3de32d0d2cd6e16a4fae3ab7c180dfacc24263e (encrypted)