# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d06089148866c0be65d2527c5e1dcfaa66ebdad8b01d070370d9cc2947239e27
Pseudo Output
e6ca69e65d3228ec3a35d40b9bce47b7f61a27a970276aa54cd921817cf60222
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ca1f6ccc775f3a6b06df75159a92f64894a9b88971a1dd15d8a1dbe7e3f4ce13
Commitment
0c02ee39dd7b0f89e95ee990075ab120941aba25cd1c1ac90fee365e34727d09
Range Proof
672 bytes (Bulletproof)
Memo
595848f9411efae0cf5ddb41d527ec1ba6608c691ef0e0595196658da1587e507f918d54ccb6024de32533aaf42396560ca798dffd41fb1c84d3af65f254e626a5db4c629fc31f3852538d05c8b0be8570645bf37a28d67d64332c57b5ac6c809e9d9f41909dc3221d06d66ced58326c3174a22d337fd5634b4a7302b64659c6 (encrypted)
Stealth Address
8eca550aac26945261217308b91978f805f6d7ac56b82b492bb1570b53326451
Commitment
c02e1f5dc77cc27ae8c0309a400cc289c171e49a63f151637bddc7284e89b930
Range Proof
672 bytes (Bulletproof)
Memo
7f99962a46fb7a5777445b226c530012da9dd213dd60ede00c600899a01b39bcbdcdf770a13ddc0df2c50a219b458da65a75346092c5168c06e33ae5c13b692cccb5edd328510a8229b62135856f39e537972a5958f3ad7c1d7df321ead33378af6c475efc68e62a906ad9788e607f0b481d4497f71da7837dd76377488b1a7f (encrypted)
Stealth Address
2ed545e2c66048b7d5cd14f514b28c3792c7f5922e33b0c2ae26b44c121c402f
Commitment
2ef7bf25662771cc7181474a34edcca47c08bc58b0abfda94a37f68445e7411d
Range Proof
672 bytes (Bulletproof)
Memo
9b045c5074dc6f1c82f4328ea776b977b48ea0b51261b216fbb524db127e6e28ca3319f5c26da3d54a56dcb25748e9e556e2b1ec1f74193e92dba8541718189bd17b38b365f191219748a9367b84bb976c8462547ee37f83653f75acb01a6b1c590c5cdaae1ff946f0d2573270605521699cfc1ca3a16a232b06f116211cbcef (encrypted)