# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8cdef747004321e01ac89107007331ea6c755169a0539ce2261e6d7d3cedf409
Pseudo Output
580d9b9b3b03290b91b9d18d03aaa70a25ef34af180092548f703e42745d6307
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8a286a46271bfae6e20cd04c988aeef625a6a56f282b47beac362e4d8f9a7051
Commitment
a6d0e56c051c2ef0029cae2f654c6776e814561558ce492090eb15c697c2476e
Range Proof
672 bytes (Bulletproof)
Memo
78129cb0302f4f22951a9a835b82f060376cdaa0d87e231df6dd7bb92ca416a1d874f6e829c3d3f36c73afff227aa4839d006dcfb5c2f81df0fb349dcfe14ae4374dae6b27ba938c90285bbc43058b8c9ea3cafce90d21173cbe0f4809381e03535e55e4eaf4fa2e7f2086b880d15f23dd0c9d4d879f3c4b56eaeb2a60fc4a51 (encrypted)
Stealth Address
0263301385c31967969a508c1613732a1ec409f7093f65a906512fada34d2555
Commitment
42c8ed6891961192b730750ecbebeb43409fb07433b6296684d47dff90f7351b
Range Proof
672 bytes (Bulletproof)
Memo
be7ff5c00b5238a6c16f0941794450a642fbb3a84ad6e626ebe0262ac8cff82ef1b9f60e2082af1cc1963e0472f52d7fe5c6e53c725387dccb950e06f8bc500e5e00908617a5eaea13ca3ee05fb7434f66085c37ccee041694375e466d05579da7d80975ce53046f6eff4d1aa62b5b4cfb43526bb8662489c8332d6cf115877e (encrypted)
Stealth Address
6647398920ac51c7800be35e8045c30c3ed7aae7e7cbc0a83e23299c0d6b612e
Commitment
726edffcfe79f6c9d335663e6c52a431fa18d8816d51d8f5074b7cb3a71bfa63
Range Proof
672 bytes (Bulletproof)
Memo
e56a9f2bcb528d9fcc1d1db5bf540bb1a306f83ae2c62ac6f1cc46d2cc8b7506277a4be87143a836eaa2c3444bca5131105e779b970a7f759b074b53654b334045859b5b101edec9c6dd7c79c1624a5a1be5d22625b9cde2ae027c6cdf0f5b55da051ccf6e0c6f66e5891b6d4887d441865477ba6854d8bacee86890bde6e9c6 (encrypted)