# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
da0f37608bb7e423207a8008265872eebe4a6986ed3e0387bcb538f3b339ff1e
Pseudo Output
52da1a8d26b6b9ad4a977da9ffe3b3c168c15e1b9163918215e317a219d18411
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
62728b3ae73b5d359e230e6dbb2f6ed42df29867fa2906bdb0cc23f81653667b
Commitment
e297ed001fc3cc78ea59d756b0d9590f60555b26ce47ef16ec1e63a4b14cdb55
Range Proof
672 bytes (Bulletproof)
Memo
349ec6a2e7244d43b5009135d2ecbc4d0dba478c537f7a658c197cfccf5dcc41d42b2f3ef3fb4910995f1f229bd63f0c4ab4fd9babdb9574b7f7b57c53a3e79a4465127eb4f84765826042097c8e5e730960a427a6138111fae17697a2038ad1d214b1372dc837e23c3cfe595c60f42eca977807efb34d5ebc39886fbd84593f (encrypted)
Stealth Address
baebb0a87b9275172337dbb5a4298e99219cf57d4efde1b09f9673d84fdf3714
Commitment
e67c2889c195e10bf6b160f94868746a6d281a0d3a4db0d06c47b01d116c542e
Range Proof
672 bytes (Bulletproof)
Memo
86702a5b715ceb57f295989efa186f4e654c6d603350fe7f200b10e739fc7683df60cddee45f45f5c8018ba77c007177dd66a4344085d36bb26646e9fcbcedf82ceaad9f55cdf23083915a384d4aec87b10156a68bfc87f385336d6b3733e8b9e2620c91e2c42d4c5d941ec44d1787f0b9fef510a60aab7be8135a0e511b54cb (encrypted)
Stealth Address
16ea8cc5c2458ed5b78d1bee326cf12b17f75fb967d212c3d606b6711dccd619
Commitment
2899723be96482459f82ab79f95641f91ed6c8d4e9b325950f7d92b0119b1c0e
Range Proof
672 bytes (Bulletproof)
Memo
5befbd733e0bcf6a82addabae9b9fa846540e711003606f1eb9ec70f98968ce3b18efd41c0f8d971e77725141454e046c77113739f960fc7706d4dbbe89cb23495765432543af6605181c324ea37cc5dc56e40e29b147aa2504f274866b2510ba567966031ec43258ceca617077cde66a7137b5bbdf2291bbe25c812bc9df0ec (encrypted)