# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
58bf1ef64909c770ae8ee017966fd8f45573c9c9a5aebd2861ce9fb97149e329
Pseudo Output
886ca60d755ea6701dc5d4c32ee73822c910f89abcf6922bce6275e30d67d174
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b2e976974b0f99f9a5f7ce77a921c16a839c2c37f1ab4ffa97c9ce101c22221a
Commitment
ac3292848addb49349948e0b0754da6a02c3d619a346fbf7ae4a91c9cda95a4d
Range Proof
672 bytes (Bulletproof)
Memo
8d84908f44f69b262156e0e90c20405848d7e4bf8cc71da5452742b00cf2a15527051e29bf61bd08e3cb5d3739d2febb4382efbee3f32a60a5b1758d378a2c97155b2a4960843e44b046e74fb0cc227e8a163906e3c8965bcc0ed9f0e3fe19a9dd0aa7a1832a9105fd28817151dafe0f10fb6b3c4f32dbb55db1c928ebf96499 (encrypted)
Stealth Address
0679af255d3950a252c24cb1a1ddacd7ed434b5a3deddacf2ebe5400b20d554e
Commitment
9687d3eea2f07c8067cd40c26c0ca1c15c54d03be8b5b680e3dcfa2a5a13533a
Range Proof
672 bytes (Bulletproof)
Memo
1320c61ea872835b747c1e96aa2dc8111bfad50874301793b14e512abd03b1501a57ca9a440eff68fd9eb8adc2f2b5525790e8adb60a649b4ab4d88e1929f3d1c2f517d8ab412151578e28389bd5f2cc3e5efa17b39d66aeef4cb1265e056735ab56609c031b1855d9b1204bf3405d7974018d5d36fe4b731c4362dc59996e7a (encrypted)
Stealth Address
ba39ffee2d73c80dfa859041d5a3163725f79b4901c0c567b5002e97033d624d
Commitment
b45d3da45f37b75cce920a4247cd0facac0b7be42b76977856a0a5fb0ce38000
Range Proof
672 bytes (Bulletproof)
Memo
e40686cfa104076e1856b7979eb9b9a277295d7f77afe3f5309d6c1abda5e24a5121a7fe7f8cdd7b75b5b5e8f891f4f1f8c67e0755ede67919c6fe5a1fc1d9c252fb18bfb2b5cd068faf0429f9e9407607460f9b4d470b0db51ec7cde0dbff642558d6a0fa30df7ca6e94854ef30d6fd39687e1648a00af4ce764cc674a79cc2 (encrypted)