# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b0c38c58f01267907637de5f83185bfad7ee542d2c2203074f0391cb27ea5551
Pseudo Output
4499f052d17671b8cda3522e51368854a32d03c3b3a240c46f3dc7a92996b315
Key Image
ced14971a8a3aeaa53db047be83f17a639c9916dbe03e2721592b989fa35263c
Pseudo Output
7434ba26ae75b2d1752e1bcc835ff5932d25ef5fb4f2302864482bf7564fca17
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
52d7ba262aec20f1179ca90ccf5e0f006794cc779be732b83177bac41f92fa6d
Commitment
ece4716ae8988ec1733ccd0ac7fba41b67b98425ec172b0d32400b11b7acff02
Range Proof
672 bytes (Bulletproof)
Memo
34a114e6f92c2f53c3d80c79b4b305ee8c3fb563a5f9a8c3c9fafddf795b9df8e07382a86601b9a1c47fe56f849313a5e81e44da588aee0d32aec8a57d502e23d15aa7bee5ed198093e522696339bb25f0e535395c85eb5112bd8ec811431a96b10e0f812adbb4fff0cebb201778f6bd33574f90851baf849060b0725a8e8a8c (encrypted)
Stealth Address
584100eb2a6c5e112f97c43656e6f945b7b1c74207c12d6e60c14e1ae8d72b47
Commitment
d8bf33b39b42055079027c74d89a1c0181d119da85f55c0abe7337c739fd9f65
Range Proof
672 bytes (Bulletproof)
Memo
5a8b09f554e35dff4192f07a3bdb94f513f23713d0e2f02711377d6e422fba4f1390339961d400f181991fa74c2c947c49c5845c08ea0380ae6a7cfa1ac54ef643dbe0f38d60223322aeb499437cbc1f9b68d800536fa0e038bcb26eededc6fe7e66a1db63c322d8359717a275b56d3a7ef758128b755a334415d2a8e1e63d09 (encrypted)