# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ca085873ee7fa118aa0cd66461537350aef4f0da164cb6c98202a86376109241
Pseudo Output
48d0d4b0bb31f96a1b8e8f077d67d94b79185f20a93f0f18c24eac9e19d5eb3c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4a82d97f62d484c934ff7b647f6c3453bf4976df927f13dd4ee99863549a5b17
Commitment
f6db89d7b3c4945f12c7c80833aabee26fd77e9722836a780c998ab454c40604
Range Proof
672 bytes (Bulletproof)
Memo
2acbfc305191cd8165cac0f61982898682467f3c6de875c13a378639a3a07fa150a69d41f2cac562c22cf66cebc126743a2f37042f7cf72080e4a839070d1cc3890fc53ac1fbc932ea3f48fdbc3d99382e71a264ae7d39ad8da65d2f79131fb10227ff82c2e6ee1276ed6225b4d8f951fcdc3164ed27607b1837b48502173062 (encrypted)
Stealth Address
988bb886e702e88be8c69e18859236f3d5dc258b8794dba60baa16ecd95d6523
Commitment
b46385c082c7b54b7d1dedec4f23dedc4058b79c8ea4b670fce79a9a9dd3e127
Range Proof
672 bytes (Bulletproof)
Memo
cb01926c764fcca4156b30622d5eaf89dbf7a3c6eef0452da3be34e66c4e3ecf9669e7b00696bc3757d6167ceaa452eee9f3bcf478de87a183f1d0164080b88e07271971f441ed6848e51e27b30313e2753bec07ea46e90dbf0f32516e65be9dfacd61533a7f1b586c9213435f84a1bb4c045cf39447d6271bb55c2737c2832d (encrypted)
Stealth Address
fc00cf69d4906bb0293eba77fcc097d2bf42bf26d77dcc38a3386edb0cfe041d
Commitment
90d8763776af940bdc56b1ff0298050e5e546c0c6a1cdd56d85072f7868fe375
Range Proof
672 bytes (Bulletproof)
Memo
464986c8f0b35dfd9c84e55093ccdd30ddbedd87afe8434722bf711b2884d6e1de638b73e22242245a06b2bd82c3c03236377cee240b39b5632504125f3fe522853245ad99f42568ce95e3159ba73d6155bc4160e2fce1150b28249482228ea99b4e55ecd35881a89b40084eba5a7eafbe9fbcdd9b79f663f0adfd52a5624714 (encrypted)