# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
72e2a32bfed67965e2781b0e26f7c819eeaf517926c7f8419205a9cbeb7d7849
Pseudo Output
8e858b13c1f6660c8eb54eba3012f2f3649b9e36bde57af2307a563128394244
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
14f63fdc37d5386cee7dd60767f3168bc53f85f44c1cd7fae1383bb9713cec30
Commitment
080080e5fd3a09ff5fda2745c7f59b3233851f98da40c6fbe02b607624782321
Range Proof
672 bytes (Bulletproof)
Memo
bc2b4ef35497f9bd855aa2083361f677669a1d44a5a8977bda47e4b3e195cfebb71901f13621f54f0bc235754ebd5bdda1f2c879c43e4b39378b2d76c63099dd47f1642565e134d1b979d260416b6aeb3ebc76a2857ece539657c16c8d2798fa8d35f08777bbc66428e120d976b8a697beb06a1a9e41a756fbf940e8317bbfa0 (encrypted)
Stealth Address
5aa75cc6afbf54343c8b28234d291f783c970065f3542ac53da2b2997c0e7618
Commitment
78adf78e8ba8a13fb8bdc338b387a9d8092e22638cfb96b1d9e81f1326dfe900
Range Proof
672 bytes (Bulletproof)
Memo
2164789e9a6a83e62d345a82ba7120488a74b9eb4cb4ebe8218cc60cf6887b664eda04dae336c4a644a1f3e7ecf6c17ccf2db08b9cbb400be681b1fba835cb3d4661d87c5b00a7cb146eb5d17decc68618c25ffc8aaab7b33730444dcb95876c59e8a7611b918b857744c0866f52197a448e8d3f850551714a5e43e055fe91ee (encrypted)
Stealth Address
8007d4df5031074d36ce83bafed9947ace463316ef2e9a3fc6a44a04f2d7f914
Commitment
aaf03f41f542af8da255abd0fea3e149719e65dc66d4e8d10e791dfb9662b634
Range Proof
672 bytes (Bulletproof)
Memo
85491dcd0903a87b17e4c97b1a3a31539b01abc3219a6aa202d406f2f08c63e05677b639145d6722445b2d44a4ffa0a93f96c98889b1daace9e991a7a109ea96ee99c104c5d1b2a7ed9ea7d0275e5641aeed91b75ecf14699d927a44936686ec7e1e71bf8a4f68749a08adc945690fa3a17df00f33c3375692907d9cf3b2cb77 (encrypted)