# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
58f2d53a499749a326b02a294ef5c93bdd634c05f0ef0b1120ca736bdabae61d
Pseudo Output
2a421cc7dd9d151e7fb8183a2b983897b478dadef252aa93577739cc6043e77f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3058fde4ec49e971bea1b27a7406392e3d66ec233c052628d6fbd47041660626
Commitment
f2ec3a9565576f8f77b4aaf897c6f80e8110b8595eb6f4ec4d41f4187975296f
Range Proof
672 bytes (Bulletproof)
Memo
bfc50a157260a3a8b12da4bd40cd9bb1e7e5a695b556b492f06a7030f0ef65010a0c497cdb0fbb97dc55f5293af906ea798364b2fa1067dca50470c28bc7be1b2f1a821236dc183a855259b63402788d6c483c41b12d98c87f427dc495fc364f5ec5ee2016d694376a09d4640dd0302d2676b98fc6d4a7ff81fce3b823f41daa (encrypted)
Stealth Address
dc282e5ef83d11e915baad961f1de378fb2b505d508836a2f519bdf87f9cad4a
Commitment
2ee78b7bdb6924f99707479ab404f73df449c3861aac6d3dded9fb1155cfae55
Range Proof
672 bytes (Bulletproof)
Memo
5803b591be98ceefb14cb0c0b2f52ded920b890c98a58f17a84c0067b3ec13a1140ddaded46df4ee3824eaf45b07cfdaeb10c62c82783bfe604c973cfbb80f3d4a6ad817e4cf77e61da77275224667cb036238c4f63105529ad3fb1c7a983410f7bfbb57393f2826f906874e1bf45982579aa4b97b845504c89c5b77a1ec7a85 (encrypted)