# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
429f2c8c0f791d7d6cf2709596f2c484121b4c0cbd379317e18ead97d6996c0f
Pseudo Output
22ec31292ab99d63b89bf5ba14684f6685b4b1e66e939917f95ef921d402272a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
58b7407aa5fbcaf40ea639951b09a05daeb154b3d2aaddb6782777729fe1de16
Commitment
36a2ed877362ac6cbbafc7833a935445d83b7ccf34dcae003a63b6be3b929819
Range Proof
672 bytes (Bulletproof)
Memo
9c0b74c74e1e4ec71e48b587ca6f99a42bb98ef2f3c645ba2d172fe5572ea6af03050acf2462194b91d36ee2d452109682fccfbac63030bc19ebea6dbde16a1cd17511440f5641688570792911bd4b2f7908f34fe595d3111f02b825bd46c7fb8ffce781f163eeb62e21afa889bb45d40a293f181659b2dacd552f6c7d1888f5 (encrypted)
Stealth Address
bc70297d4ec3ba6fb5a11fc86dc27cfdd16239de660014944f6e733f2e7cab19
Commitment
b8b708e74201ce18378219e6a9774e2f88ce396ab0964ccc6ec5c9337d5fba4e
Range Proof
672 bytes (Bulletproof)
Memo
1f21847a953646d51d9946107db36f079d054a47e9c5324dba93469b0e1e7527ec92ef4018ab8768b7d50af26b33c65adf7e3594c1ea64df101bbefa7123f7b6d12e4fb013e31032db215a9f9ba61f89042617208f7ba9bf004107d4d42b1e4482189f401d2a4b4aecc711023ce2f23c1a57a1373c8feaee41040f92e7181370 (encrypted)
Stealth Address
8608a6934047af497a71b75c874d339990847e3fa02af8f238719d4a9e3ef466
Commitment
34e38f957f910a3d3c0e75d2ddba036cae2d90a7a0699027d6bce18c825bf126
Range Proof
672 bytes (Bulletproof)
Memo
e229e8c80a5096b7f9b3e0128f0626435de994dd81da16174db95395b299c05fd989153b2be1395522ebdab5becdcb50fa6f343cee1f7d9cc7546fad08417287df19d5bc7f2b7887b6d5e24ad7fae4e83c5fe8893c44320f7bbe05b9449595413d5229000c7a0e5974ea01611d364f272af725327bfe2d2b86a4bac89a481b10 (encrypted)