# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5242804a8bb9590a6f62ebb5e411f23a5f00bcaf0976020cc74fb2866cd8d12b
Pseudo Output
8c8f4f0f05e5183a01ad9a8a9fdfc3cc0a6a9a4f9315cecf649a3b6e6685e117
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
52cee1d25219068bcd1728c433ce962854ac45c774d0b7c9affa4d0ed894e05d
Commitment
bab740a3ad3d64d17ce860282aa0f545d5fed9e02d95186c2346e1b2a561566d
Range Proof
672 bytes (Bulletproof)
Memo
c9465a624814cf043856d48b34763121748e8d4f5832737882517506db0521f65385303203c33016cd32679aac1f3177b0b867be627dd1acd41e4e250a38e7905a6ee7002d415799dca68e9e6c7134d93d110ffb08283c9f319cfe8c284b162f94b9fa35b12b529947ed4f4b44754801644fd6b892f2172941076b515cb4815c (encrypted)
Stealth Address
12a08ae05cc355952ac57e7b9d2e2584cba73d21b1b7a3e01c3a0f313c06146e
Commitment
b0800f00e6d1a17ca4f1fee12f7557ba679bf64af9e6c1f93e0718d452337d4e
Range Proof
672 bytes (Bulletproof)
Memo
36e3eef7e1c380b9735ffa80fe694de67303e4f917434c80145030657f8846a6ee1c87f4cebc73b4ce7ffa4d2ea97aa8a4b7fe2613e65f08282693843c6110850e6bc13f3684aa8862d09ef094413491b82d74b0bd5bc65ad793f34d6c461bf11dfad553731be04619be6016120198b66e7f3c93a899e91be2ac72c2081ed203 (encrypted)
Stealth Address
4c68684d235b5eac01becad2f0d918c5b547d6cf9b138a2d5ad5b13dbc6aed00
Commitment
a66ac70480eb3709c7a96352fe5cc7b16cd963faf57a7cf1dafe9e4bd67e3b07
Range Proof
672 bytes (Bulletproof)
Memo
defeebeb92b6524050dc6fb7c006873fcf400d0b5b7293999fdc4a3ac148df4bc0774b6efb6fadfcd506087c11ecdfb4b082afda5b10fdf202507928b45fad06e261898eb90dcf333cd6bac2540276a5af43a44dd1ef3cd8750c7f6720cefa3bbd0ab884106a2d54e9ccd967f09600293cfad50a163ddc0a574e4be426011666 (encrypted)