# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3eb06479086a37814a2e74e1065d7a8c0cfa650dd963eaffbb3356b3f9a16953
Pseudo Output
58ea7b578b9d2ea346653f721a15d24295556964462c94c5f534864f8a984012
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
528f0f78669345c9b546e5beec4158727b3c77b68d97ac661134bbfad5144571
Commitment
465a012d89efd7f9ebaf2e7ffd0af6b6dea7156e85db6ef445caf5540c67ba7a
Range Proof
672 bytes (Bulletproof)
Memo
e3cbd8af025f58e310bcb32a54f4cd4514700cf6c6bb7d7d046e504ad721083bb7c82d864b9ddaaa6291f17a4eea3e4be50c73d529de4a2cc05fe2e3d2eb1fed5f5bbe35d7af67488508fbff667deae7e8fbc1f6b78611d2c7b78c7780799c1c2ef1de82856719aac83d3f8e688b54e61be32cc0fadfd7a60502820f7eb6b2ef (encrypted)
Stealth Address
10452b7508580021ced6fa7cfc8e0ad516736a65b07c288b6f2ba2d561e3d67e
Commitment
00eff1eefd132d31d5b1fce3b754868f32caa6f23b749fd50140db7911770127
Range Proof
672 bytes (Bulletproof)
Memo
9d64d63ee10aedf124192ae106096f3dc8a1793cce84f79f3d11f6cc9c24cbf6a2e11ee0d7f53b0bc585b624b9f74cd5c5cd85069f55211ac19f8074274bfa2743f99f47b72151566b54fb6bca37137ed53107b36b97418e03e15e12911062aa16cc875f65265420aea076028f0dbecde4176af36d125a9205f7064e8d08d5ca (encrypted)
Stealth Address
264bdda8b46b2cef1f07f52cf7e95b5945c519be0fc93b2a4f719730afdf736a
Commitment
b4a11d88e3a8f64dd643f9cf41205150cb29357097bcf339abebd1ef9ab6032c
Range Proof
672 bytes (Bulletproof)
Memo
3ddb510d70c34f5ca9423bc8ea0d6a3dcb3a5a520e63704776862982b77e3bf9f7a9904571683a0e0767aa06289df80cdac805e1f0db6dba5f5d0cad6b5b7e178dd97c896b05cba1de247bda508955d5ef6b9b1f862c41c05a0b35ab41801dbb10ba474a07b9964f7980035d20fcd2004332197b32673a8d0d820582525b36a1 (encrypted)