# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a8ef009b219b06aaec642e66e459366d7e342e94ea316230c5b02c04ef9abf72
Pseudo Output
8435f82884dd691451162bb6265822d0d1fd13f5b8a23b8b7623b1baaa597473
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d8bf2deb1522587c192ebace09e9eb693ea8940d7a67545c407007b7b875e719
Commitment
505fea3f6513380ec3b46f3104c731ae324a4c736ae6f0147704e9ff6a531b77
Range Proof
672 bytes (Bulletproof)
Memo
da028bffdbcd9deada2393566484af78a257343db87e56ae5078025e3bd0ed67ed4f06116d14768822d770cab131503fad06e918eae637aae9622024bf16c006afd1031a4b8aa438fe02beab786c6d5b5dcd78eed3db2eea062a7b0697dc3690eb5be37166efb2bff44f5b0e4daa52acbfd0fb5286708e02f0f1e4f931204f8d (encrypted)
Stealth Address
72d9d3a6ed36135119f0f78ea54eb4425a3960dd1bd562571ffc2ab75f4b6c13
Commitment
44dd925597393cc8ccbcc265ea435f8172d720b9241960bcbf44a83436c10b4e
Range Proof
672 bytes (Bulletproof)
Memo
bc4a06eef2565741aa8182ed0aa9aaca9b4acce44f5dde0cfa81940d243fccd3e24884864d4b6eea2dec1304e09a232b0e035b63141a12a2113d018fb069ad9e4eca79068e0407c810291e4b79bec474ed8597c08747724c12526c04992b527d2abbf19820d0bfdffab10455c2dbbe50ca2a342f7517411f001361dfd591f8df (encrypted)
Stealth Address
7e58af913eec2ed135620512e796a7981632425fab2af236a29b12d9e5ca5721
Commitment
a8ed1f4246fe5e9ddcb3978ae9f3ff88457ed389de45dcfeb1ae3d6dfe87ef4d
Range Proof
672 bytes (Bulletproof)
Memo
ce7669a861cf8468b2ed0c4df8b5219f75b872115d63fd13c1f179b250e8b7c95661d3f5a3a4347f045f192b10c4c2c21f572e828c86b3e61afef24f388d3b355e739a1bd64679866d309923f2c8698bb1f2b19ce439b2607eb65e4546a95b43919d381111a0dc6daf4a0c89e736dcae005d6fc31cf88cd9c20439d480e17b55 (encrypted)