# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
58842a03eaecda77a89bc8248978315f343ea8640d74f356e722f93127ae7270
Pseudo Output
a85bb8d47bb919d6f81392091ad425967c8180eb4bb085fc632164405c70ad3c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
685aab75c0c534cd823b5ef07ca167b9472f0b0fe5053ecf796a70e9e2740b44
Commitment
0e3e1b0336cb2bc725fbfa51d4a8315b186392b166fef586ebebd37ff5517962
Range Proof
672 bytes (Bulletproof)
Memo
56c4ce1164174f980dbeb97d600378622f9e865bdd63b16161e122253d0c7676de8c508e4a291b728dc8dde9bdbf9a9dc5e41496e323bca0f12f95fc67943b750272a20d84f039f7b78ba8ac37988018c8adf007cdbbe8bce60f9239dcd2cacd57f5ff7b213c78474f59b9998491aa1dae877ce8392a050b7b762547b4fa0830 (encrypted)
Stealth Address
088003761c3433978750da99509e2461c17a39df090ac79204d5ed36254fab76
Commitment
6a30f51d13a6b5c743451099ef7f11c802d719455639e1a734fab94e43ab3718
Range Proof
672 bytes (Bulletproof)
Memo
a2bf9898e2892b128c0a2e949d638366eaaa862efd2aba01716b86403c988d93dedf634bcf757e659167d9e26a34afafc6ae250824ee50d653ae6a8cca072571333613e6e0ad274f8b66f57778f21b842f960f9d86684cc1378b60d4f576c86fc220eec86667b3a36efd318ee1bcb684a8728e0f0a6d66c34024e0bb65f593b7 (encrypted)
Stealth Address
a073e3bde4665c8b2fdeba52e3d8a1ea559dbeed48b58d9489eaaa1da5db3e04
Commitment
c65fbdbefbbfdd358e0716f149dd758735e4d206ce3a538809580bc99f920254
Range Proof
672 bytes (Bulletproof)
Memo
9e36345cd6ae6371f94325e2dab9a84286ceb8a7da5c18f255439c006687cdb57b10cecac047de62e353455f711eda6a3039a1dae54de9196ecde118b9ee345f1f7da4045af3b7617dd93ce16652be8038ef37719766f08961ceed1b2d14ce9e2edd48957dd3bb2a8fb59460c3419c32d3305537d9e7c59fa48e1975f8ed873f (encrypted)