# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
16295ea24de61f9bf618dd3100e7ce88a2720ac1254d1bdbe096ab3d88d38b45
Pseudo Output
54012023cee173b2509d8b2728a16a7da5d4730573f00f5f975bb35fbb62ac0a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ca3b1980f72c139e42df3f5b513d42bc15cc607f4b48337830ba06389792fe50
Commitment
180d43b4101d685118efe128e22a73f43613c55f68d0a30248aba03fccf6b802
Range Proof
672 bytes (Bulletproof)
Memo
473d6a5a5e472dd5eaaeae94db9343d107ae894cf23f97ee4cbca3c9e1c1c1b30629f4a2ec3d24233d0529ef62037369119abfad13713992272e0441c071454f996b63f7d9b22e15f9b7484c999b2b89769f98da79edef989a090234f9991d4c6a90cf5ee7add196fc975b3c339480568910ab93ccf62d4035b0b32fe3ebf30c (encrypted)
Stealth Address
40da9f39abfd59b15a117f7199369e72a0f88d0cdcb531740902adf22711f428
Commitment
2c2a144e15590873a14265bd76beb73630940c425eb639ccab964c9398e5d531
Range Proof
672 bytes (Bulletproof)
Memo
8ed17949fa8e50478ec671980099cf8e4111f20a09b9e8c1847fe4ac324002ad1840b4d488f9b802b5656a2e7b8323f84d27f44471750266a08858f7ce2881c42a4abe476c742c2172f120be7313fcd5350537ff4978876875bdf4113c43d5275db65683e0ce2ed652d7b201e75d198a21ee0e92f2106db64ac6f966447917a8 (encrypted)
Stealth Address
389b8ad254485cebb8041d0d83026d34632e381cc61fbc10a01775f468cdc34a
Commitment
7691970deeed4dc8e26812e9972b1d7cefcae12ee6ce2706a1b14e92c1948b54
Range Proof
672 bytes (Bulletproof)
Memo
a6c428bedb997bc8020465e6df3eb2eda7a31fc5255965b01053794b748e789ae0f4bb4147874e2bca16136497519021bc91235972f1809bd2eb02275c05aa314dfd0c1aec71c563a9abbd41018c89f4a7cf9e6f6c9737f08b82f4a41da28a38b18d9e89debc185a374747b2aa3db32cd11d2d0ccd911b5ec6443d0b5800a480 (encrypted)