# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fe63f67a3207826178496cbc9b191221c060ab8618332a8d312e90b2b6fac962
Pseudo Output
ca1a4426627f43515f331e1580c54096c135fc9b23b443b56efcc30779952566
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1a9f3f3f984a11986c49b5dcfba7d014de1903fcd145bc6a9d64a237b4931c3e
Commitment
9ab986e4f15454609f60ff47d79f7cd4c388c2b25ab4f35d191fa952195b6b60
Range Proof
672 bytes (Bulletproof)
Memo
4d05d6c0aace73e0a041fd48b3996977a514828f610cfd3c8407ca62bc3957e3d8442ea38c9c932b577fae460a6b3a7164d435fc82ee9af83adc33482b1cd2c1798caffff3f4863f730acaaa65c87946288c738239d812191948118d9a369e3452cc85aece9a4be01ba37bf269fc721cfbeb78614815eb37fca30ed992f7173b (encrypted)
Stealth Address
2e995c38e4c3864422f16d1d54f1f1014b6915e1e3a014fa59aee0b7fe021340
Commitment
fc2e69d1cc48a2a5457b1af011da00b7f7d05454467a4d8e59018518a6c53a1a
Range Proof
672 bytes (Bulletproof)
Memo
4438b53c5f09578cdfe1f3d69635e610fee70a3cfe9252451192e7fa5c137b6544219c87a48ecb4726dd7203babe2ff907a66bd0d2f7bf6f7ccf0d8eecf4c27bce420032bf99083bf4bf5f6d5b29244ee78d1c88e08deade0f83e25c16a2d038255b79c4632c67d9cb9f223b27e04aef3e981bade855b95ac97dd0f3b64a9faa (encrypted)
Stealth Address
c083c907a93e231854326505c9182471df7949da7640d5e9774bfb461717142a
Commitment
b20cbc7747378fef13bfc74b44df8cb0e6ccdeda20609ea3d97fd6e8c0519a29
Range Proof
672 bytes (Bulletproof)
Memo
3df2a05c56cd97baa3523b4c78c6e312735c8c672c1e8bc6fa255f69d4d4d3dabcced66b899c0a51e5195ae9b0366d775f9397c520d58b3e1d34e5c85ad53a998797479c604b14c2594537d81ac6dc3ea68aec31ce76e6ba3b55c2662544b3c836cdd7ed9cff7a9487ba2caa6acf2c38821d7f132576ffc5d055124219382a93 (encrypted)