# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
52d614e7e59a8f3695e7ce01c6d36d5c9b6fa73236018d8c800e4d7ebe17a477
Pseudo Output
10c20713e4ccd23e22be5e485b6d4d3903363598d9d6dbe52a670958e25a106d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b6c2af517166c7eb3c60a6516b294082b8f10e6d5135b6366dd40c24e0f4556a
Commitment
ce3f2138aa38430d2d009bc620b26328e704397a69f27671ad4b75fcb291d218
Range Proof
672 bytes (Bulletproof)
Memo
b3cf559cfa6892b86d720c6d26bf6b05cb2f88d66dcb46c90f7d079f8e7c7f635df3678871d6d1a2a56067e7879db3c40eb72f18983972851afcfc587c0588a2ffba366da071b94e518ae28ddc4624532edd5e49f27137e30d016c60b0f9c3124fb5261a476f22f3aa063c390193e4e7fab784c4ebd4b9bc8be33b6741d4ca8f (encrypted)
Stealth Address
743ad396a2ff09ebefbca7b752c10e914f5c0e8bc8557a8c4974dcb9f04cb34c
Commitment
8ad6cae5b7bb754c64b7032aa824360784ab888d496ab754f6c4a77796fb5e4c
Range Proof
672 bytes (Bulletproof)
Memo
11922927940320f528bf0df6e715379647d9c78027021a52dffcc89545c94bfe856e076e28a5c2d27c7969f395a3eb0c5c25abdac1edc3c7a27e0aa3de9e5679d5770d982ed424b9e6e42b0570e88706552a4ef6d9937dd62d94ce1fcc744bcf9f08c8e0a764fb9123c8e6d910bf3230d47b5a14cc9c4d5a7851448620eb834e (encrypted)
Stealth Address
aa6ba8fbf895517e105970357769c54b8ffa237f8add622f62364cbb93adb746
Commitment
2cf0aaea6f1c063e8d2a6fea643de578ac2da6fd41689cd02f3a3201d547a607
Range Proof
672 bytes (Bulletproof)
Memo
096668f0deb33022f8e0f2c7def4448cc5f3ffa671fb5fe29f93dbc1621413c7bba0c01af4f6fb64d96caddbff1a9914651871a1840a6ef433459d684780c3fe98fa6d5cfc7525f331aa780ffb8857a84b9d3777d2ed713ef1e27b349249c61e66f281ba9ba1ff2efeb2dcf1a235c16f1bf48c9f37aa7cda4dcca436a5057c71 (encrypted)