# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8472808ded71d1174a7b28be6c0bd69f8c288393fd2198c6975f5bf6b060795f
Pseudo Output
ace3db3d1f683b307181f79e5d7f084671f07a0e9d154967246bfe49fb8d2c60
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
58450b61cfa132bcbdc8a8419da9d860f6825f5f7d85979f147807f9d58cfe66
Commitment
2ccd764567e3f80305734131e9e6bcf883ba573d2a4861917c702eb3d6e85142
Range Proof
672 bytes (Bulletproof)
Memo
caf0235b5ea7169cecff71abeee928fa7c8c07db7b148660faaf71ecb08f01997e828c86a8736966c40b53c21039e5c09ac0690806349f63c83c255a6b888d1abe8821d6c9223a9a929f49342d235fef624db7d9171db37dcfd3086ecb96ca406d90e0c94160a090da64d5ec60a253cbe25e803b11e81056eceff5aa9833922f (encrypted)
Stealth Address
3aac14543b3cedf1440489bf7208b3a2ff7555b18b395c620d33dc92d60b0808
Commitment
061caf4ffb34bfa7f0b291f3ffc01d8bdd5dd1ccc3c5a3bb1049f23c50942607
Range Proof
672 bytes (Bulletproof)
Memo
f12704df4e35a46048df17b4be1720493aba02eea21f9eadac63f0bfb75dc97facab17ad5feb1598708b3d43b67cffa9f987cb5838f5ad6162c418694873798c9d3952c04d25b67f26baeedd160e77a8fbcf8b201e5048d2ce4744888815b4a1f44da32e0d439f5bcc88401fb7fac1aa032cb11d082259941bfcc51db038e11f (encrypted)
Stealth Address
d416f5005d7d6362cd57e77a8766c9ed8140351b7550fad080140930f4f36c27
Commitment
d894225e84efc89aea7aba68fd5f60ababbc084fdd1b579bde300f4afd781d3d
Range Proof
672 bytes (Bulletproof)
Memo
5c700394f9fdace09f1b874d943e9ba6e9076681efc55cbb292a408f574525673641fe956daf0ced78e2806c9b783c012f01bb5dcf34919f2533c1464cd84785bf86ce0816ddd6acbd405de7161d35af1f590f5086c55fd07b5bf5d1eed3eea3fbc2c8ec32cb4e4f7f17a5005a8dce60175de32132d249c80d957625f8b72805 (encrypted)