# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7c2cdc6b6a1bd6a382f563d0e04d65393a68fa0bcfa64e57b3bb1cd57346a926
Pseudo Output
067d44c87d96e22b6335547a9c73d465de929ab4d342757a93a3eb5712894052
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
52d729c63f74fa08b1b739fe2a007bd0ddd85c41be6744240450b838e04fed03
Commitment
d4dc679ffd1a8f34f2834ddc0d607207840bb4dd29e649ca678fea352be0b100
Range Proof
672 bytes (Bulletproof)
Memo
c6c41543d1d479128ceb991674775a30121715900b7361d7bf2553550b20c699302abb3a23c39762c0dade8a4f1f2b8ba520c07f39d5b3778a4f6322b6c3871ad20a211d7a853ffb492cff8615654e38745c87060a24ed24e8bbc27a35376a5d8ca9cb3b6a815deec7e30cd48ba42612a685a2ace11de3b596a120c2958954d8 (encrypted)
Stealth Address
ea59dd07d6ef45e89a423bea9ad96025aa4db7dc26e71b80a5216905fb836976
Commitment
ee8c5d40fa4c18d599d0c17ab86fb4d13178ccd54e0bbd72e8ca40d92636bc50
Range Proof
672 bytes (Bulletproof)
Memo
5de65283e42904d558ce7c2cd92c41dedaba0ec160f54a28534ae9c3ae1cd3588a759e99e0c701a32f7b858bdfac9f7de3aada3d8d5e4db6f4e47f01521a8afab5760c7af0fc015e3e97521f58a776abc33610ede01ba4c563dcdc047008bbb2c0c18f4b2c5ee3da4558563ae2a4071f2aa018cad5acdce6f385c28075b9d4f2 (encrypted)
Stealth Address
fe1fa7d88d68c8d4580b77d1c5144948d0cd69c2ea3fec67f440fe14fcef3d6f
Commitment
e24d7b22b66bf969551141f02d3fe0f09fbf44e817c891a733f79c6035fc1f63
Range Proof
672 bytes (Bulletproof)
Memo
1d5066290fadbf0cc83d89f68325b9694f6ab18dd6d1489a0d61da60839af9e4a4beb041b60bf2e75356d2cfc95af339541996a220aa7eac28b24f887fef1b680dc4a6a957172bc312e359d47d6dada1e8e968f1c99bf3edf594fcd5a6e41cd800278400bab1771e0084e343ad84c4caf61f114c9403f71df796ac1263d6a102 (encrypted)