# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8c1166c12861125c9846080b8c19fb299f734927e5d069d142c1f69ebb954d77
Pseudo Output
b0e73a1853aafa6206f509fb3c1255c654cad9092057e774c4c1a147cff1a601
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
52f9b5a6cdf346529e2fbd28233b0d4b857bc44f44a5dc3a8ad3d8ba63dde32b
Commitment
b885ecd1cc9f4fb8b454802606102f95a0ff5cb09b0e8d23957940f8c8b0566f
Range Proof
672 bytes (Bulletproof)
Memo
2ba3f7e8473a27e947c3ee67d4b80e32d109eca146c91a206f3fe5661732d08b91a6feabed9663ace4adda1c11a65af0a0c222bd250ef42c992f205f2d27eab15878f01789ddd52b7dbe4819767957af9709af1862443bbf54a609f0d70968b542049b9bf5bbf5874c89aae086f1e2ca8144a851f02eae6ce78f2553ffd06f9d (encrypted)
Stealth Address
5888490bd3b3faace63d11b3ad72d6f02e4d7ea3a3985b0684b3c076baf42964
Commitment
f695b7de71309778a30ee93b609d4a8f1d877c539a97528f433011d5caf92752
Range Proof
672 bytes (Bulletproof)
Memo
d634f8b10b01eb3497fd9d2297e80854e864dff67523716255fe6781e3811dc81eab49cc2fd5a0649f379ddeacb1e95a8118815fadca62870f338735c119c3a9e50d4883fde6242e3a36f8e6913ff3b33d3152c1b02a96c4b522093806f70599ccedd8a1c5d98736bddd4adfcc2e20449956f0d31e40feb744c6d37349e587e3 (encrypted)
Stealth Address
0ab83852db6670c5d2142dc0d9833cb0b5ca69b7133d3425c93cd6b2ce7db65e
Commitment
c622d9f1b39257b53c7cf383f2ec12bc267fb642bef581aa055373b2ddaaf519
Range Proof
672 bytes (Bulletproof)
Memo
dfb3f16468cac7dc798187b294189e4c649b7957397af8d58197986ec6a16d632784e043637166750fa583a51ac31da5d0163367d634d3e83049b4c0e3f167abe79788d9877bf368dc6a00c122a07e4bd67cbde1dc8b397a53e634275cc82eb31945121d6b9b052d8b50f4b2425d6f7d45db6544902823869043ced5db3e547d (encrypted)