# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
52fec581a05acb25f1954b3d96945d3f2634baa9937c2c0935ef0586cd38b777
Pseudo Output
ac9e6dcb0adf664a20a507b0c504e97035bafb168ebf13aa0ba6c537abaa494c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c88737c5e45b559469e8c8f337c3d4e5f30c2ff8ec7bd7ceed26b0e400e2fe5b
Commitment
0ec014ad30a38ea763f4180e7048a8832186ef5a974c5906292f8d19b83fef69
Range Proof
672 bytes (Bulletproof)
Memo
663b2da481ea472de051325ab19aacab928d45e679843075adcd2b482b39cb2d581a1edcbc7222648f7d033dcd72d3c357cd3e412081ab568021ffa670705d305f8d131ed0b021944d128d1a818efa13f498bc9a4c5dda8055749b126c94cf9054b09287065d9d312380147e720e9c4199f2c150eeb33079d8339299dc8aea3d (encrypted)
Stealth Address
32028ad288e26034d708eba27ac69759b912073fa3cf0b7645088f6a7613af72
Commitment
fee52bea46dfc05c2bbad436500a33dc25ed9d1a507d1570e391e7fcb280946e
Range Proof
672 bytes (Bulletproof)
Memo
5704746baec2d890548b3e720263baaafc75abd06b15fac9deaee654043dda8948d511682845a069f1ba735a8796f602e93ce99cc6f3b8e2dee4d71873dd88399fc7263234fb29c57079cc558cbf47a6f30aa1116840409e7d7ac700edcd2a5412a94d33e0068c26a904de085fd775f3f24a462489a77952575fdbe81b8d7acb (encrypted)
Stealth Address
c26e4ca7e309e7c8baa61be46d3b495221633758dc1da0b9a067d9d4d90fc307
Commitment
84b2870df7cdeb33e3657af3bd66cb590f1e3e9dac0033159eaa76f7ce7c4023
Range Proof
672 bytes (Bulletproof)
Memo
2705630ef19fd3f3d2e9fca9dd866d645939bc64851f6e6ab828b27088d2fe2c2cba7e0721336ec241edc5bff4d7578b825502fcc733995eb0aa12253fa1cda1f13c96e010c04543da5c999d4b4183f5caadc374782cdad2590ef723f20cb72477e276584aade45d0a5576d605bb28b347bd1fe366cde7b25a90c991f109d502 (encrypted)