# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c8924a4bc998447e84cec9053a50de432f3354361672d7f499d0482401804122
Pseudo Output
04169aef71377a14314680407df8887de926b00237025ca6653ffa1b8b615018
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ca7b0b3dede680960804a432a2744e8301a4082f0723e53b6c671afc78d38a2f
Commitment
b6dc7f107b675a4043a5fb5dcc86ec903b4dded933ecd765b72dce6eaf1cdc3e
Range Proof
672 bytes (Bulletproof)
Memo
aba535b8d7df01db3ba5189e439216cb089f37549ee6f76de476aa911eb246f1e0505b2344b45fb0c7f4e54a94ec9fe4433cbe50f162f33b44689ee0d5083fd2789ff11e8ff5e6f1f350a6b8b760a776b37156638ce2202ca3f05b2fa2f63f4783302bd28e0f3a71f2268524bffcc30a99b20ca4517681303fa28f8de8d311f1 (encrypted)
Stealth Address
1cc310d82d03e1d0a6c334ab21b4b95a45387f60dcb6bc366e7883bf7b6d9814
Commitment
8c7d158e795550046a92d79d80ea60fcc5e2d8844c0ee6555c4aa717d87bbf58
Range Proof
672 bytes (Bulletproof)
Memo
596d99b683d5ba843f5ae3b4981d798dc704753c9face6ff3bba1d1f60c3d66b925dbe4283fa18024f21afdaffb6866223d85bb17252f16011748ea2086d2568363560f1dc29030f7cb09d7fb75ac33ae429a0b1f6bf8d6ec699d37f8c3e2988b322dcb7906c87a2c37b847ab45bb70cf40b40d12c9d5731246dd30966a2d8d2 (encrypted)
Stealth Address
1aa8b302de03ae6fd597876af94e82c77274339f7af19ae28ebe4cc97778c071
Commitment
aceddbf318501aa2d23f7d52d540c291c879ab8a7315212b4f6843e7ce2e186c
Range Proof
672 bytes (Bulletproof)
Memo
f20d619d0a2db898c81be354e65986c4361cf543c39b18bf87d247d5f76414fbbe63041ddbf9885eccd0af8d9073d87346f805b89b62f3043ce4042e707b2549eb7016412af829039d1cf4b679f3b1853749cac88fa444d1023c923e0d05f1b16469baf6c5e8b55d86b671cf490ad42d10139fa49c19f28dbcb3f864817ed6ac (encrypted)