# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
740bc507e7b83f1bb8792b1e1a2490396c8a71a61bfa67403b32a7adb5d4b337
Pseudo Output
3ae0b4e9d9136be5d48a91d5cbc8860f6128d009d1665add0ec66d8447c1a078
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
58ad4043d8a860e7b02ca9481da820cf8b932adf8c1bf58d3f2ac16fa6b85844
Commitment
76fa34c540c8c8862e70efafafcfa7ef8af0f46b4b7aa6cce69991669b8e8c63
Range Proof
672 bytes (Bulletproof)
Memo
b16db1194a7e5a30131f829cf619af94f8b13a82b32e8b1dbc360b49bacc16ef969a0e9befc8a56aa7aae255dd1e75c4facdc25a4b54d9112bd2eb14565e013cf17c38fdfb9d68297d96b8162aa3befa3bd2d79e0384f57df37caa43303a0a25f439e8ae18dd98f0e46ff7197d5e13bab1cc12ffffe660fa30691ac00179e565 (encrypted)
Stealth Address
b0ccc2dd025f393f83f4daf1b1ad63b008a007a6e1e827b584156e0c9908cc1d
Commitment
48ea1eedde618b005896d46623b63d0bb94e8256868f81a185de324f08fca420
Range Proof
672 bytes (Bulletproof)
Memo
62f285e1725e048a56e1ac3a0133aec5c388a5ebc5579fe95e4176c0a9f017755b51697dff279157d46f00fd695467f205a3f98d5044ba7fb734f17c7f90cafd94f6c01d73f2d9ff0d74d8a38a54998b1a41b391fa0f6fd47b9b67c53f5eae66d7c5585b9ae9417679d5db2bd203a2ce74e0cf7599eb513d12413e976e7185d9 (encrypted)