# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9675b9058763fc921127aeed9d00740696585dea8f80358d2b268b57d8d92644
Pseudo Output
4e711bb486e4cb0e52090dce07acdecd8928a6c7c0f8152e9188ca0adeefb261
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8a5be24da0ceb9cd543f3ca4f0010cafaa0e5570350aaf6216a69318b159db0c
Commitment
9e78a8e90285be6b0580c0cadb1faad19b503d1a458a6bb1ec3e77d5dd1ef44d
Range Proof
672 bytes (Bulletproof)
Memo
562bc72274ed8639b6588ee5d7c8cb92a3e814a2206cf9f1888b1cb2b8ea8299398e60fe3dfee1df88ff094596cd1e3fdc1ff06c175faf2bb8f9fc6bc3889b7ef9cb81124461fd65252af30bd6668934b40dd58f302482d42ee3864df7100ccaca2b53e12e5ed288cd0b312f3dad1d94b30bdd6af13e00f2861cf6f647b51ffc (encrypted)
Stealth Address
48a5dc00351800a336ea26749607cf787468c68d13a162efde4a2c1f83b2027b
Commitment
2017d9cbb8e3bc09f283535cbe22f049c68e7ba308f8c830c69629c7cdd03645
Range Proof
672 bytes (Bulletproof)
Memo
0ab3b53546f95c34d1f9d046c099bd304ed1e6f18444a43bf8633c7197fadd4ef0a57fdb041550ed5087406776e4c1e29b848e0d3e4a11a8e2e6040b67c8c1618b22d7ed86979319f6d9e9a16dc3c189e8ec14273409c910b51346edcf717f5fd9c60bf1f3f9d1b29d0751de3df868731e017e70646228394884d0c63ac388b2 (encrypted)
Stealth Address
8e251482c2e7e092d4ebe8da92bb0bb741b4e90e98a6b37c9d88306d6b7a5028
Commitment
2603a2d054127de3aa9c50e07b82464fa8545e969692a0b1e09fab5a4dbffe29
Range Proof
672 bytes (Bulletproof)
Memo
f0a9bc377b6eb3f94a7cb667a13da8e54b8b98909ab563b0bfed1db11e1d363993b8fd1d1fc6f3889ed80701dc3bd55b63388807abebdaa60b6d437f0743919cf9ef03c3f3d08a3116c34fabc760a8317959fa5821865d4e01b39d7495bec8370eaf2e5238d9da4ad89ee5278b9e9cfd44278987db03dee30281916cc0dec233 (encrypted)