# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
52d4c1b64d5cc594a15fdb1e2f10622b2b7f7941eef85ace870e2067fca40903
Pseudo Output
dc9f227c93675436eb10d868986dac6f1e4e2b406433a55ee2dcddb91c9ff92e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a2e2b380c23b069aa43a1051c62b77257122a5116d4e78e0274d33c42846ae63
Commitment
9e0bfda62e34028f3b3f7ff726491ba4c62167f277d4e4dfed56a5be14860f41
Range Proof
672 bytes (Bulletproof)
Memo
c983e64ff3c9d3332fd22566c6a62ef1bce0a85a55982420771e2e247f2114568f3f9db90476df4d901fe0337c7677bba65e17c5d59d68b1ca16719e58a51604494ddcb629193b877e24558bc1c5a29187b02c24cd2145f8141a31192c4819978ccd388fe1c0183144e6cb6e0aeb0c9ae417a46b7ffad779eac69d3a314541d6 (encrypted)
Stealth Address
4e67fb5de0ce4c5cd0a888474b5c1d5e9f03ba5e2c265dfca3e1bb472148191c
Commitment
5472a09317d89fe60dbd20a027b4858c8149ebb657109f72716d91cb57c62f46
Range Proof
672 bytes (Bulletproof)
Memo
2dcc68a2deb24422576d38cb0e092dbef41c9a30fa9f32d76e9f0b91f6074d93efd68526344265020c86d36c6aaef1392c810c1e28f2c5af52644e17c2789105a743f391c1fb15dff4067c70fa2a765b1d99ac3938d916ad3be6c75a7b9d6946a878b5515dfaa1a18b1bd1cb45bf5428f9efbdd442ba8aaabbed1e60a8149a77 (encrypted)
Stealth Address
a2094e63cb4c2b19b12dc70b18b680f2c99d0e4aa97a1bf3d26f6d9a82d56320
Commitment
c6031b33f6087b0d0b54ca2da2f92dc58c8550a76175b7c06a7ce7e89aab175b
Range Proof
672 bytes (Bulletproof)
Memo
6030a93e300ec1bbf13d2fa81d5209e273346cafe65c9331bcc6b3a9a4ebded87ed30c16e45ec542be0c4b9b3727ca79086efc10ea8f0c54887a3adb3e640d5b36d7b4795f630081e9df0701bb72bc20f06769d817bd89741f3790359ea0d11762edbcdd0142cc20cf1df9f7b38676cce3678119dce464f22497170a9d5e0cc5 (encrypted)