# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
58ffc191bd10567b7c97ae0fd9fb966c8495f02c237bb2f6556c90dfa85f531a
Pseudo Output
9692a360199c9886351cafb677ea56c417eadabaf7913f8c1750ce572acfa673
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
18ed582f48a9069684bca23280eeb898c72c6c7372048be4d4f4e662f64fdc77
Commitment
74174f109ce2917e057e8208d4e2a3de30d58bb1a5be8ef84317b8a0b3917a04
Range Proof
672 bytes (Bulletproof)
Memo
c6749f00db34e3d54e89c659309bfeedd76e4cab8c7f8e91ed731c45a73c1495418b0e61dfcce94924f850fe6b1f6679c2bdca5725b2d4db9dee44bebf31013cd8f71e3b4ebdcb8279f7f58cfd95a7307ca65e3975f24596f17c94e2935fa436b2d3aae82143b478f1514f6dad05c5ecf8452985ee2c02681bbe1a5c70710420 (encrypted)
Stealth Address
f0e3fda14b56e58708fd9fdcbe5cb7bec33b39b61bce5c4c2b1083ebe5dd947d
Commitment
7a62da6c72e4b274d92dd778518ffde004e28366a2519a14b3d8ae9b44d5b724
Range Proof
672 bytes (Bulletproof)
Memo
ad95caeb7cf0a595d2ff31bab703cce80b99ab4f873a81478fdd2b458c1f396b0ffaeb107bc017d05827aa52d4485b136e9518de854a8ecabcd255da501b0c86b96f6bc92d6ef53bec2f2e063648b1a1683e8b5148875c928c6abb764bba16fba6837ec8ffc6aec5b3cc7181ccf287a6b2604157649ac7925aea84c61964ca8d (encrypted)
Stealth Address
f623051410396f60b94909fa7ea28f0098a0924823691155858cac8b0f561205
Commitment
34feb8c79bf5436f3b92e81a858cf91111e9511c0da5d83664e1f2fee4494577
Range Proof
672 bytes (Bulletproof)
Memo
8b7dab6586054f74f04ae1762b5184d1ab82758d04b62077ec8ea7b3e01838e8b2f0eedd1a36c2f071533649136ca141e5c5d4d9be186e2a3b7e491338f256907c0c40e1d6ace7a371072f8d143fcc34466eaa3b8d8d767acea04d37101279bf7cd38f6cf643c49ac7a9eeb860c459d06b632f6e4340bd495c59fe07ed96d40e (encrypted)