# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
70d280bb60ef00078db225d4375616797e4475adca815544d161d4e13a9ea94d
Pseudo Output
2ed6486e6396959215143bf6104cf4e2e8b11c11ccdbb044c955938bfff7ea28
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
58650540ce6228014f63e773385373b85e4a113f214232bb80b4f6d0e5165b58
Commitment
ca63f726bb1b3adbb5345f06128c54ab296792bd8d15598edf983f42900e8b3f
Range Proof
672 bytes (Bulletproof)
Memo
b85dd35ae2645ca2882e0f651341324d7d995922276714b3e6761a42c4d3319b7c58898e221b5f05c4fd7791b171b2146e4a9d60f42d4718145d866471599d16b1a1d37162ed6baba3068aa6ff3eea3b26cf8f64dab828025b05db4cee85a7f40873d9619e8944d35c0df16a9a45b30133cf86a12e8b5c1d0a9b6db63df8d35f (encrypted)
Stealth Address
2051682898fe090beff6cce5ef3f3d85f6172ee14c9615ba7c6b6976d093c24c
Commitment
1287f6457cb30cd3529451ef84151656a59d039c66359ed196c919d2c50ccd6a
Range Proof
672 bytes (Bulletproof)
Memo
9bda942ca715dca36bb3a9a79ab79f6880eeaff63446ca0b76bbade239ffedc546c51b27debb887a072f95fa2d03bd1cf3222c1da24982eb661e7635e3e343be573e51a07e623e74d481a250f5b84d6876510590c74a2b0ea4a609e3abd0fc3e9000307704b2b5e68ba57c4568f6cba4adf7b24e1461158ab27a7d9e10b4c69e (encrypted)
Stealth Address
5e68fc87dac3514c9a712f50cad8e51099b56084f5894422497b5f3321a09f17
Commitment
72fe68a51d2217a052bc479b304d7179097b1305cddc2c2cb2211b80a514aa3f
Range Proof
672 bytes (Bulletproof)
Memo
e7b504306d9abf0d03ed21dd1317250d3478ddfe6faf151ad7dfe240f887da6a7151171e43d216f500a7530ff412f8cd4521497cb3339df1defd47f2a21c31c4e5ac4dd85fcf29e07042d03cf7e584436f65d10b26445fb1b5cc7f1bc36f36e30880c29723d05729a6cf74b9d714ffdd9cf5c5638ab5b0c0eec74e18ad1f26ff (encrypted)