# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a8f8778316fe3d592474f66b4fff5fbe80c0ae58b852885c71764ee0d13c4a23
Pseudo Output
7650d207468b405694842af12bba03d9ef0df4196d1082be1903e19f70a71a5f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c8a7d375c2f6240da16a19ee8347b2b69eecdabde991a124ffef8d1e08ae3639
Commitment
c8c25e4f0bb923d89a54c37bd29165230714c6111408fa65b84f0027939af04d
Range Proof
672 bytes (Bulletproof)
Memo
0c8b7bee6b5b077ecc529d0890bf53c5f5bd8dbfd217513320908fcad98133ec301f773b9e6abad5918f20abf3a7045ff505cabc91135d2a3ea84669af836a5875ed6fe7621ae8752399d08ff1bd7982c8898714270ac232e9f89f42bfaa181fcc87fd38d24547d83a284af98b96ae2b4977e8e2662be95a52d602644c15791d (encrypted)
Stealth Address
4870daa15ef4b645bfa338f9f8169874385b0bff01f13f011c71be0119e4a82b
Commitment
989663e64746c19d8bf69d03c2632074600708f6173136aa6afdb41a887b675f
Range Proof
672 bytes (Bulletproof)
Memo
9bb5bf37a0734c96c7f1a28b8eff8470117f57b6cfb837dce51ac30da508c4273df7c4d55eb1127b3e3472754c839b6688c8121cb8f26983bc5cf7489a70018a3c753d8a1f90f3d0cc1f46282700eec402e44b71181923cf8ee652fd9457d9ea39a8b6183dd8a31d57622994c0889fa6fbb2b5947e3fcb571fe397969551948e (encrypted)
Stealth Address
888f5338bdf1817957aa7134683c44a83e3ceb74fa9d3b77ad44f758a94ab324
Commitment
ced4205ac2aad13f664c0a2b1a43f6ab973b5e44427ab3833ee00a809ba12740
Range Proof
672 bytes (Bulletproof)
Memo
df6d686c8f3019e2e27884c070fd0448740823d1b1b773c71c8c626865321f8e40665bc50a2a2443ec621a7e5162c2f9844d5bad588328a22468289f3b7f0b3a2e23e864f749efba55ffcc14315429273fb30f4b726f183c14cdb44ba997c0ae92bd212f3bea632f5b4aa7d2f6a433652bd5f1cdf3fd9bcfd1bdb634fe9b67e0 (encrypted)