# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
52014085657a15e73346a484aa2062394bb934aa008832a27d660e8eaeee3918
Pseudo Output
9ac83821af05c312ff37ca3cd2892fd40846fddfe30b1a68a3851ef541fb0936
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5eeb4d63e8056a7b25d92ab95b3951a72c70cf1c6c3ae271ee95ce83074b7512
Commitment
5ae92177824d1fab1d1d0945bbaa3319ddfca50514454f77666b7e33368bf840
Range Proof
672 bytes (Bulletproof)
Memo
abd0d9b369bf1ec0f90613d929778d6a0727377d6bbf14c7cf692ef367918e73407749755b34eb1cc91071ee257f4a3440f083a675390b198e803fd0dcad87731882e6a70ef64611628775efeadf31ed319f7bd7ffc78c9e29516f669481103fd3a28fdacb6eeb79d78a5fd90e3b8b4e9cbfc7cd94b608484acef388835dfa57 (encrypted)
Stealth Address
9e4cf61e4e92e715a382650ad74df8fe613615e5e7cddd26cf048d0d3c6bab23
Commitment
04ea4aa45cd47b7bef6c99364eef6f26d6ef03daa4db4e340bb57c507b77b957
Range Proof
672 bytes (Bulletproof)
Memo
bd861dfc24a3d04f0e5afabf6cef189a0d864af5e1d9015db7dca626704ad81b4391f57f8d27380f3c5a5414f90b1761012ac870cfbfb299b675bc39046958185ec8a29176097d8cd32abfd1165f75fc4a88f4b0e91cd0b834768ed0f340b8c011f52fbafa50f20160fed931657721691e677d3cd738242c6ee80da3ecd6e5ea (encrypted)
Stealth Address
36580a3ab7a66d0fb47256364239ed28def2b2aa3ac03da1ca69c7e7e5f79267
Commitment
bafe3052d1384ce987f68287a1e44d91e7619dd2f2ce5939b6ef94b4990ed47d
Range Proof
672 bytes (Bulletproof)
Memo
96cf259a5b93b69c06be630280f1f7ef9a23bf124b58097d0e8bb1a5c7b27d44517da6f5362c9aab94b4cf1c6c13fdd04baacb302ef45871c3b1a379df9553a7b6dcaf8bb57233dc1aa0f4b172809f07b0102ada3a0b22c9afd601b73231ea06e1ef31ecc8774ad405f3066ac463a7c2aaa56cc68cb340c7e701c72388bcadaa (encrypted)