# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1629bda4edca404a43f35cfc426fd0ddde17bdae328734865d62f0efc806c93d
Pseudo Output
482f8366ab3b9455cc5758240de442ec7ba51b1790ae5b6e2abe28ed9f0ca962
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
58ef287dffa450c0a568820c103057ae466579fc581c4ff2770bd477e4ed9800
Commitment
30e46afdf9abe100f5e4ebdede6b130a533daa5b7e375bb2d624a25f0b8ff949
Range Proof
672 bytes (Bulletproof)
Memo
e1e6769006baaddfcdd8eb6bedcd960e4d9f34d595317c9d57e28fd4284f30b5b58c4dcca9e27341a8e5a34f1c00008bf3d785bac02ce93f22fbc974973cbdd8d8ca0345e67d3347b479203cd448aa3a83930b0cb2b3463965344dc395393719060dc03a1e992dbac40c3d3db4d7ee4fba5fee63d447245ef4c4df59fa872a7f (encrypted)
Stealth Address
64c0dd69a01ffb14d72d929ddf5de0b2dc0dc6e93e3d12e61bfdd43c07846810
Commitment
101ae2fe4f5224dcc903774faf2fd5ba75e88735b94aed1300371a1979a99640
Range Proof
672 bytes (Bulletproof)
Memo
31c1a8bd4c19f2653da4e711a95c643597cb25cd3e4f3ac71a701d8923c6ca82405e6a3424ec15dcb2e6b362166f42443bfe67241d10f6af0f9aba04d4592ecddd6dc356965d3e2d684dd500ecd7dcf4645e3db45363927e51233eedceb2b0519ecbdd8252ef1fc34c6e67debab2b6f3e63b7625660249c23838fd459cb9189c (encrypted)
Stealth Address
1e523f22715dd39e38902b88b41d774d5757944b5294f28f99c8b62ce7c8e649
Commitment
40207c668d7b3f3a8a2a11dcc80c63bc335f827a9e8dd7ed229d45d021b39a40
Range Proof
672 bytes (Bulletproof)
Memo
3ee0394626f61d419970b9f5d3d50af79bfecac25cdce85d4b62ffe19cef3228c7fdb416fe1b271b67f2030fcaefdfc80f9a7c29c46a039d981060a6f5ac605c8f022db8e190fa03410143fab1505bbb3665293603a2648af3712486f9ce1b9bbe5d370c24773712b87ca82546ce60e9b23bbdbcfa1ab6a1001dda50ef56c6f8 (encrypted)