# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b8a52c3246995f017ddbe70c06d1148baefb0b708bae8782fdc1518de74a074a
Pseudo Output
5c1a1c83b8c15fc1b27ae4bbe9971d362fc45cb93189e3b6bdc5237273b00a4d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fcaa68645504f08c14c1f09d6af3a82b022b53d6a852f23cbe2ec7f161e5dc64
Commitment
c0993703eeb22bb1a1ae77dbfc89fd74ff27fd43a3fedecbd760c83b465f031c
Range Proof
672 bytes (Bulletproof)
Memo
23caca9f89713b15b7440ed24ff3e6e1063c8e55b606123e41fa6f1a2cbe1e995711d516e4613f7ee85cd912696b2ec712a9273e3e1a7ea49011341fe221ea6fa93a58527b651eed1be379f9dcb20398ca3222ed43aa2d1b18d4210193fece9990c3fa82e7ebac60312a406fd4733f137bea3f028072299ec4f706db30aba067 (encrypted)
Stealth Address
d2b115cd7052cb77ba789711b61b8357aa4545802fc3ca51924c7a0e07edbe18
Commitment
b2a8a7b133306e6c0dda71985aa89b6617d38e8aab42177bc52694b99d5c5060
Range Proof
672 bytes (Bulletproof)
Memo
0093e857b6b647acd89b80561b361fbcc84e6180eb976fe5c78a23621398f56f4b83f344a0b22c79f3728d270199669d1e2eb148181359a20c591087125800903c707acfe987478e0e43415de40764f849db614fdafa390157e130a6913eb26fbf36a6deb9d8014819c73a4bb8287c89d736dba3a44da3f3f76af232df1010e2 (encrypted)
Stealth Address
a0bda8440286b3fe7ad82027cb9f7fb2943d98b4ec6e29fa89b4b8e9f5357a5d
Commitment
4c964c04e27a561bf522150775810e0f0869f8b27b96d377e2a6a5006bd72107
Range Proof
672 bytes (Bulletproof)
Memo
dfe050958e42b0d1e6cdd52638568ae7c01a11dd42a2288a82631da2107ee42c74f8d26b7ef97d4aed7007c71ea039f860e33e886e4ac806f6e2f5a7553e174974a10ac5136664dd52bdc7164e8912a0724eaa82d6dc4a1a76eb9b002c229f85e4f5ffc3daf0ae12c9fc60f477e7bda0787d1d5fc1505286929124ac3a942b42 (encrypted)