# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ca307b08b4a1d730dfe5f77400a2366c659f9d31dba40f4ddb44c52e3149b201
Pseudo Output
129eb8ce9d530c1a7d4997366d03e54980109bff98d5b335c91d13b73af4421b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0c8f477650dc387466b484ae0906df6702ec15c3eac9d6175866839b054ced0b
Commitment
a00666ad1077ac3c54114dfc791b6d82918d78a3694549127d86921072bcca7a
Range Proof
672 bytes (Bulletproof)
Memo
621abdad987c08c9294228ac360204ba8783824574b678b8fb7cb04b2a165107ce880e0192e90337ba483b1185af789ca0ba6f40ed0dcf8b55f6626bc6931c69a860c67755a583cf48afedf1efdb3fc8dac842a5ec8ff12f148a30be6f3c7d30fc5359e7c08127a9174def24e99e156eb9e6ba5f3158b7b52c9be897d77765c9 (encrypted)
Stealth Address
88f8af885f42a731fa0ed18f52376e71fd2a9fee2789973858eb075d01c8d71a
Commitment
fabd6e1c6ae880f2c37134280cbc99fac5f2ba9d1a849e2b829ed817cddbb236
Range Proof
672 bytes (Bulletproof)
Memo
4b5b9ef6f59e7ac814c8a937e151ab0abcccd4865910dfe3875572f30741e05cb7dd07222da0fe630c653e6f7f5a6f924d58a4d69bcaf9abf137da9d7367d456f0ebf99ab8cfefec40bafb1a81e9e6830002f81ae3b83491254861f104cf5dbb47f31d9ab4824305e5fe69240cc52ae7c3a34de68652f375338b00f8399a46b7 (encrypted)
Stealth Address
c61d0ecce7e2b7119ae7c99102e07654f20e435b89489a4256ef01e5d7643164
Commitment
62ba48933a4178d866f4538d4887191e24255100a64544bc820395eb9511262a
Range Proof
672 bytes (Bulletproof)
Memo
4679bafc8a219cc691efbea96eaa9a00d373602d6399ce1944f003dd2759139b7052d22be9d6df3f33c6b44a44d67706578832d8277ab6e0e700beabba93bd3a79a284574b990b2fb370056658a4920f6cd3bcf34a1eda3d1ee861dfbadbb43bb3fd74a1ab42fc86fabb3cdf8a5f1a92e908b173f0b623b909c699c1310131f3 (encrypted)