# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3cd833bca314a5a4acd8b6be5dc8966f0d2ee4d31cc32c7f272592c8a21d9f54
Pseudo Output
faef9de00dabfeabdde2e6b2306948abe1ba280838ec612693a55ea811f7243d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
58c67fe3b28231938e3720632b1577ed08f7f6b0f4b4490392c4fad9f411c71e
Commitment
8a7be0f4ee6854a58bbbf47a9735766f74e35dc41f02bf348bf33843865bd350
Range Proof
672 bytes (Bulletproof)
Memo
558685701ee6bdc7736d9b83322ffad41cb06d44c28603e3bfb0eb89096b57fb1cfc3a2853b0ade1e64996122cb99288a5fcb024903b3f4a857239673ecc44c15a6958c959134b64b9cf9679e546deac868a956630b5260e18608eab885c556f480ad64c7d21b7b704c3f4cc316827b10b047d8d91733f35a8f410fe72d3a00b (encrypted)
Stealth Address
98ceb588ac4684a40038c5088f156d188f068450caa584f324559f6b09d7da3d
Commitment
0205f202f5550bf34e400bf07d9e4ae4533697c72a113d40656c2d2db88bfa77
Range Proof
672 bytes (Bulletproof)
Memo
c02d991f684f715fc31c09f5dbf0d4bfd46963620ee0f422d9dc780da3a8b95ffcb0f08b9e5d9d5132c3e03c4d53016b0e9aa3a88430e50c766e230523aaf5fc950ba153244cac299219cb572023d4b1b71cfab1f164b5c212a1b052ed3ac83562dc13c6342689dcc453dccd5fe1aaa6c35f2c46b6fc04eea02114c1d2bb99cb (encrypted)
Stealth Address
98dd1b19636a0c0411b60d09cbf9023b0031a6a62dd4794f1c683ee19ae8d906
Commitment
d07f657ccdb5888679cf77e22f1170d0b29faa9aefad05cd20351c818ca0d02e
Range Proof
672 bytes (Bulletproof)
Memo
ad2c9e0e33f9ad58fa7b327bbfc3643a15d9c74584f6fceff8578fc94a41df3a1624c22d5cd06203115ea620eae6f622639a22a53da0880dfd5982273a92146faff6c85c447c14c67fd25a9ebbb053d79d1c66b4bd6559b5e709cf25bee90da9909a9543c2d8794a5aea1fc1e9bf69e997f8ca889d4c0f00ecc0ae74621b22e8 (encrypted)