# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
58bb784d2fee8afbb90766c39037f477c2b3a225aebd6769b7295bf978559851
Pseudo Output
dee774ccf65f4354ae1fd589c4839045924114e1683733c9455f7e8eb75c0332
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1ca3eb69c9c9db5eb5b11a6c97587ff2816a477ef0e94daf99a58a0fb6abd47d
Commitment
a8f24dc3cf219daef603d46058b9ec60b0e8115b1a9f90607048f87cfa0a3a42
Range Proof
672 bytes (Bulletproof)
Memo
6dcbdf148a33b09bf08c630bbc6a7089c1d821ef3cc4d255a0951de7de98bcefd8558401d7ae11072dfeeb8db01b8eaac0f074701c74e2a222ded9ef642be6e455ca8d38116cd1d1d99c585dda6a09c52a90270299139ec343d9e669435e5ff9a0b71e209e52d6719a6a61e2124b295ed3050c4d78b6f1f05c903f817b3589a4 (encrypted)
Stealth Address
80113d8d3267e4751692bb181b5d5be0ee1ffc086fc70b8c8aa57b36bab37a73
Commitment
287616851e56e5e858fad9ced7e4712b3abeb57fc53a640136c8383d0e3df46c
Range Proof
672 bytes (Bulletproof)
Memo
dd38fce6ca9f399586f9ab996a2958628829d8cef1a100de7ede12f163991e866bde7ea47a706e6ebdc6993e89d1e9e65785b6b17f81796ac4cf012ab125c511675981fe84811662b49bbf41bb5dad1e495b462a41a0f2f0cdb64b144d59f40f6315d2e40284e26a35a40f279815001b81a3715419b29835b185023ef8b613b8 (encrypted)
Stealth Address
8abe26f7e8e0d7a6d1ae7e93a1925fe9f78202f274ee0ce99e6db33a5f6f4b79
Commitment
fac2921ab73ad49082ea6312fb83ceb0da724eb3b84b2d418926c0d64e0ccf37
Range Proof
672 bytes (Bulletproof)
Memo
79cf8520ba3fd476fb4741d1bacecd1dce40ddfb1788aa02a27dc5791566d31340efac9a7851251566705fa796660fd050adbacff829b34f0e89250f620ffdd5d6e1f7291e3d2acfa612c0b6521b8430be4c0ff235888bd287d393b87c61b9c92f6f15701aba095067baea9135d9a3f49aeac64b41cbdc4e6eb47dbefda15a61 (encrypted)