# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
303293c87e65066ca62e6c0e49d6fcfa660c96ace98ebe6af3c99670134ca43f
Pseudo Output
367419ea22782397e49eb0211201843770bf5415fc1b1ce0eeeaff8d4e72f757
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
52e0e5d9341c1f712c5fee9e715b5f42fdb683beff6a6d95a0903b152ce31876
Commitment
bea690fcb7c29d95d61c153ad6d9e52f91591fe9e37f2c509c52a241111b1167
Range Proof
672 bytes (Bulletproof)
Memo
06c626557e69ca22468b4171bbb87d46ac42b6eefdb63a10c6503521e652fc9b2becf0e9dc07e0a5d1e79f876dff182a4bbf5a1792009d3e50aadeec0e2be296404e3745fa7227fa39e013eb83573fe756078dcb128f76fc94c28efeaa58b634b64a9c0c286b04aa3aca19a8eb8605f0943eb4bec03b783e77661ba3946f282b (encrypted)
Stealth Address
38cc5b6690f09adce1c3fc712ecdba19a73cb70c8e3d47e4b4381b65ef91a86f
Commitment
14a528440102cfa430e003b836b7c5a05243d671723ad7ae14fb4b17fe474415
Range Proof
672 bytes (Bulletproof)
Memo
23ab8feabd307d401b117ac76df616aecf28815ad14612368c234d54a24b77cf34759385829865bb6241d49882a4efa715b6724c4edfb79756ec147f85dfdc9ac08ab0dbc14a268d90325587fbd2b779a28ae4328deeff898a35f61eff5cabd4fa3b3f7120443738cc232972102d957563e8672398945bdcd226e28b275aec9e (encrypted)
Stealth Address
1c9d1a39b89fe773d9b9c27631168bc5f621dae760cb66f7bc2f834a3dbc400d
Commitment
d216f55b264ef25ce2caaf0116252d268846a8a62b21da4300def33892659237
Range Proof
672 bytes (Bulletproof)
Memo
58275da57d544d52a0bb56cd28d439426d39ead80e0f5baab86e899846ec775983eb76810155ca6080a2a8c3ff07d0884c4e0510413c7d69f5b4d540fbb205b73f4879131a3b95fa87c33113a84db7af202fdb9582352395d3069356a7462396ae433a487e597c050fe487cc1eff64bda197cde4f0ba083b3d51ac21ed573a86 (encrypted)