# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c8b8172579966c04c83ad4a24f23a28a0bd3b56e1c040c427e4cb7113724412b
Pseudo Output
8cbe2b015d002e29b255737babf94b13d5abbaeed749c6fbc330709425e5051c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8e0d25215b7d8775419c9b351daf200024afa220772ba746535e82d4d5203423
Commitment
da6656fdd9a978a0175def19280b1cc975dfad0c5eaf799d0b9d4eee5642fe66
Range Proof
672 bytes (Bulletproof)
Memo
772c6c8e377bf3a9c6956f25f2d8f187a17309825502fc62d3d452e2353f644f48dcd671c8688221c7551d1c634d0d4bc00451dcd9ccfc105edba3f102678e072bb1a52e1f02d4e33b45e0607f25b4fbb3796301674c8f4f3f65e8dc080f30be9bf3479623a4bf448574a34908d8a84da561261ffeda5ae08f164f8c9e506a14 (encrypted)
Stealth Address
b4ab32045aec3e7d7ec9c6eb08b4cde54ba8f7611d7a933a0d3d2bd684f7951f
Commitment
aca6918f19e80d24e03d41e9bf65b5b0e7cacf42e412939e693b895463739e64
Range Proof
672 bytes (Bulletproof)
Memo
cacef8134bd674d7c215e29faf6a92ad61293eafbfc18dea3497a90efb6ad62e17315b344f0759f9791f524efbfc73fdfd4bc91ad39d13c4d6669f23960539f2dbbe66a0a06ad8ce4669ba9978e6e50608048f74eee4ad6932978d4e436a63e8873d25c158317046ba88952f8eb1ffdcd2fd0b56b4865c6ec63b228c1b7a2b4c (encrypted)
Stealth Address
ae32c9ff49c4540461941d92980d86bbbbd62dee6f56734f8fa00ed7f46cc807
Commitment
4ad6004468e57dd2d89b09ab43d7d3aba67f2a50cad7a7474ec6b60364c1fd58
Range Proof
672 bytes (Bulletproof)
Memo
5ef5305d6e9653ce0477ce7a9c5d04fc03e564fdba6de50b19667a3f28dbd570dd628ec2e9cb883b072bb40e87e98bf1c61820d43532f138e9009ea45e0a29b24b0fd10e07fbf48efee7161a3a86d0939250d1b14fd1616708b39c01c92a871edcd0adfcbaf71854bf9cfbdca7dd6ed9683b33e448ea2355d81487aab38904b8 (encrypted)