# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
88b393e600bdb8c1d85dfdaf5305f944c9788af6b3f8e52db125bb58b0b0fd53
Pseudo Output
5a0eb8f0203765caefec736668b25751540bf5c08cfd54ae4bee480bbe35f20b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ca0c0bcd829d8dd090dd954e03787a36e4a35828760205cdaf2726bb857a8910
Commitment
c6b15183b99058fc453789f1589221b2876f10c9253d87cf53fb9df01889d806
Range Proof
672 bytes (Bulletproof)
Memo
89e6b96acd37cd86f7a843259a3233ea70751dcfcde380de5053714d9523ba86a20c75fe540a976b002ea1446d3b37bfe9596ab4bfb214c15a5b95c89069a000ec044cc664619fee983ec6836412958aa0494bab23b1aead109532a000e4e353560f64aff368a2a5652d90bf48c7bc67d5d12de70e2821ef26653318031eae1b (encrypted)
Stealth Address
284c2d5cc2d260514f38e955466ce978c79b748e7c5f64cc9e184f06df098f53
Commitment
b4865728dfcfe577b9f15291b30f31d268972d9ee97d1cd3040969dacfdd1b43
Range Proof
672 bytes (Bulletproof)
Memo
301d433ef01a71dcc9aac4e3150803f27328f4dff8fc900a4bad53527762195288a21c9aa34e9ba7638b93676772a80f79b73a10455e8eeea2d8f79c6b5f15487f677b46ad64dd33ba9b67984dea599907a7ad5494cff2f683ba55b8d52cdeae1fd86552c3c2aa79cdae00cde32f4e469b7b99b659b25b583747e3171a9317cb (encrypted)
Stealth Address
d4a9097651c5dde0d40024b80d669eca1651c08e36973cffd75231ee9130f079
Commitment
ba131d908323ea963eaf23c5e9ca09b9f20a6d0334b91b4a3107be08b26cc600
Range Proof
672 bytes (Bulletproof)
Memo
982e741a3f686cfdaa7b51dc9100ce7427dbd5c25ae92c53d3707ed60d9d61e9aa89abca1adf29d010169ec0cfd8bb168fe51f033bd7aa1818798df52ce32d46ec90b15fe083ab1579d4a89393c843f93f851a0ec667b56d11405de9b1e76dc9de88de698036a8ade0cc89593247a3856ace72c209aa4349ce50a5a522e1f021 (encrypted)