# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7e72f21168a1d756c657789eae082c2c9e3e9e87fddde60e7c48a039d9957955
Pseudo Output
6c56b4f6147db78ba0776d122f8c499f9094e49b9213e1915b8ee6de56b06d03
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8c172e7a36aacdebaec3d009e53faeb6670635f6a51d380ff6999f4b3f32cd0c
Commitment
14e2e4c23a4dcb3524e7b07bcc19fefb10e3591117bdd8d91a8ecdd867d4795b
Range Proof
672 bytes (Bulletproof)
Memo
5d90b1396a64bf9913a7356cb35ec80e11272741ce7c123ad72d0b3a2eac3631c3bd5dcc4cbee3f9c1d90b598c1aeab399b944a3c631e8bae3bcfe8f330d08e7a5d64a1477b1daca029cc8e244ddac5c3688c21aef2ecf4a011fa02dc6a48e7c66b56589f0f2af4967bf713934d3ea503096751d222587e609b5bed716810861 (encrypted)
Stealth Address
7ea60556af653cff9f2b24923fee955fb11018b558e969b4357cfc2f00d25206
Commitment
92142c82c563e339bf6a46a9ff24eb30cadf34c3a0cd7fc7251f5d8179b3475e
Range Proof
672 bytes (Bulletproof)
Memo
bc0097d7410694a6f21094d9b57725c31ad04c6bed4b43cd2faae547c493b1164479a79566c88e1f4e6cc80f26df64230690ad3767faf669f366b43b39f1dfc5c7317613e0bd9b484d405c421fe98148eeb248dcdf8ddb3c9004d907ea0bd7619e15f672d7bf1756cb83e7f626dda8b616b70bccf04efb3e3914a98b6c0a2035 (encrypted)
Stealth Address
3ef6b3891626c29dd8c80cf5fdf95c8cf34af2e6b49355269e7b39529120523f
Commitment
e8d2b6dd00daa107a61ec54b2f13f729c5182a72fce591789bd63a16109d9014
Range Proof
672 bytes (Bulletproof)
Memo
13d91d5df06791044b559f81ad09637f91f26c5a0fd0b75e9cf46e89d6a73a54897456b243b2e4a68d8e99844461d12c85e46ad42f7355932ec5c457d2ca38a1f730447d9552dd47782be19ed3df64e78f43f5c0225c183040dbc2d5df12482b6fa7395fe44e4ea33c5709e793bdd165abad6da1465512cbd76aeb14269ac1f5 (encrypted)