# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ca909a37a4170df1118490790ef5b76d1171ced35a42512b97f32334195ee135
Pseudo Output
a4f5f8aaef150fd04eccb4ac91dcf5332f023a4c53e62749fbf4f66ac281702c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
12de38ebfb3c65a7864fa66a9def5d92838b687ee9b4804487eaa9bfafe2022f
Commitment
5802ccf0f5219c87560a97e0c4e52247dd7531a5c9e7de423d0335c2d8133b24
Range Proof
672 bytes (Bulletproof)
Memo
2cdef89f6c0747bfeaa029f8a9d0804e2d6a8e24ea7aa288a23a3738dd82303b02d51d65f5899e2488749fe5597408e68a0cae326b1e64db5a849fbaa30edc1f2991478739b654344b181e76b6dc1d12cfca368e036be7b80804872336a3784de7e0bd8227b5b9dfe40115ea4f1a6b377ac5b57847703113fd10634340819a94 (encrypted)
Stealth Address
200bad7d804b6dad616d527c6ec743efe672cc68f8642219fc087ff4bd213d28
Commitment
8ccc6cbbbb4d4c3bf0633f581fb90fa60ee5d52ca724f056c8f66b7fc444d112
Range Proof
672 bytes (Bulletproof)
Memo
19716844270076954e0d4c6380aab281ea0fc939608e35b163e61d832da6033aaac4a385b9d02d2225b62d83e45d5f5de9da35616127a388775093275d4b7337ef6f461153f13211e6485bd900d09cff930f2fc63e7aa45b9509778829b5ecdc9a6f45cad2d43b9d5671b348b84541278db3e1bed29daaa712069e8dbd0d75e8 (encrypted)
Stealth Address
fc4fe18f402f6074fbeedd618135a53157a5e258b8abf2d144b477acb2da9442
Commitment
da4e99757f06e91c812b5f068bc74d8f1df09a76903690c6360dd0575706bb24
Range Proof
672 bytes (Bulletproof)
Memo
f635673bd8417ac911d72f27a26c8d73a507f353dedd6f24738b331ebbe5a30e9ba71b6288058f01d0c49043add62e6a649c8e42d7b552c388dcf93806242988d51d4fffaf922cb6d2f8372ea715b28f93b1ba585b6c490b107c900c3124caa99f47cac501fe749c10f03f95278ad42d764d01aa9c8e60df4d8537c56b4f706f (encrypted)