# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9a1463a45667f7a68890ac262373f84eadb8e561b1c3d665d7f509932ab2e64d
Pseudo Output
34be9663f44460d568f389320001e72cae88e3153d71487c9e9654ee10a55d12
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
52d6aa7960da3e16294a2a511fe7b937b783fdb95786cd8bc5df7d36cb0d575b
Commitment
babc9709670e07ba0365838d28e9979b0174c9a11912d08bf0ac05d2cea7b020
Range Proof
672 bytes (Bulletproof)
Memo
485e9466aa381008f6262ccc7a7da8b184331b6bd5685af752f2006ef6a177f6a359da4f0f7782efbbf60ce26a781348cff94d72a10b0bb258904f0ce1fe3cb1dadc9c209396e49b2690a474843586db9ee0100a8061674e9a391c1dd0a61ed4045b7d2c4a5bfec2b8e55c2eaae04267e9c75b023f0a8abc4a79c8874430ae5b (encrypted)
Stealth Address
02dee0989f2490929f73e8c80f5af56405472f815da02438e96c43b686124d43
Commitment
7a03a21e9d375b3473e38bb93cd7d5f85da9ef3f67697fa0393bf87ce947623f
Range Proof
672 bytes (Bulletproof)
Memo
e4e9f4b5ddc233b947b66ed221451e4a247b88166074b58c2a7401d461c2aec3ed00e9112189f8fa25a0840c719398affee7f47885fbf515f3f68a6ec74cf6313ff1abfbbd6f6ea3afdf2f32fc426bd330aeaf59635079fbf0f0b634c8990f0763d01d4ffa700d0b4329f0ab55f7b07563cea791f789fd751fc8e026b9c65911 (encrypted)
Stealth Address
3070f1f6dd07f0c7c06f314d1487f715e4377cfeb0218fb7f474b58ad9aea10d
Commitment
56f9c0787360f96ba089efb184057e7061542324d850f17d1ea1480a96a2bd4b
Range Proof
672 bytes (Bulletproof)
Memo
4bea2998f4ad9a19e6a7db4ff7b91504639e8a8b6a9eb7bd5b6d1d880bb878c6132a7cf423d5fd2f484f0ed3927ef60d441980476dc8e1ccd9a2cf2ba7e0b150eb1f6da756db24db8b242c6b6436c41acd361839078683b303585c9dceed1a1616929b4acb0d2a169c0ea901fd80110c7e24f38e64f8ad59fe7e1812605e2ede (encrypted)