# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
be79df2d72ab5a3461db56888e534ec899885a580cf23d444294fa4213ec4c55
Pseudo Output
96366086055861b3fc3c829e19f91010c42352713ed521b8d460f205c2f6be65
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8c4cd52c1c68a31a8c3dc8d47b8abe492fd2454add0586786764ff1c9158c568
Commitment
e65a1ad9834d51cc1e7c2aa4d219bcd248170b3ea6e4b208dac83101ee4be53e
Range Proof
672 bytes (Bulletproof)
Memo
36a059e037f620d28fd8884a917f286cdef4c245c8be3fd5c486d485c19161d49b684e3db78bf0c7cd40490d11c81a28a39c1d002ab8169db4d3fa6e4bc6b6bd62fe21a43575b696047106a82087db2e85fc0df12fa3c1fca62462b3b84265df8b9bd9b0952879ea5bea55a2c0a1b404555ce6aeb27fa3811cf1a2881170b167 (encrypted)
Stealth Address
00ccb9f2eb560d2a8671326bfa28c715f7ccc5565c03dbb0aa24d123ff595460
Commitment
225005776e9aec6acc253eeecd62c8e6c3c44ade6054dc217e45118711753133
Range Proof
672 bytes (Bulletproof)
Memo
a4b2f9c939d83a0825ab795227b0e857c9e9d0701cda46f06e9dadee4769dfb5e120f4443a7dddd40407e4c05e7b827ee61bfcf764e724a5e6cfa4f4b619a4a51dda7c7da2b4dd1ae020e692e56478f45385001555ef248f5c1893d371feb782bbfa2cdaf7ff7c5be14f2f864c89d5143a27431f7340e8fdab825578e3ae0c86 (encrypted)
Stealth Address
1489632c3119da81e58ecb9914b291d5fd3cf03476d921aec12f8087e80e6017
Commitment
2ab5c1a18e92660a7a915e86aa3386443fc6d38aad184222d28f22414d3e8f69
Range Proof
672 bytes (Bulletproof)
Memo
a13bedee8d399134806111d837ce832ff65ae2be05feaf642ff56bab7519d64fd77360443c2f3668a2160d68ce51a7e7843c1c13e3a881ad6d94e50150663cf30506f80445c122a010d13278073fe8e6fe9fa9b245f7cce6d6515c8a1c6f624b471b05d341a70e3f232070604383ade02eca305fae7bfcd599b6b8b99ba23540 (encrypted)