# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0e4177d5ccbd0b0d3510b9146571a765a1691c2f51a2c55a751e4bdfb6a72e52
Pseudo Output
c8ee70e39ab437fbc6116c1bcb7e7a17a431d4a69e35ccc3d527a67a4db1101e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
52e94ce498ba1520faab24d309d3614753badd3d694ba9b4b718ea27d3ff3b74
Commitment
9eefc6a1c1da6f456831b3ef342ee8b6aa8969f79570efdf7063b4774672f07a
Range Proof
672 bytes (Bulletproof)
Memo
766f9e575a1fbf92b81f3f3b8c8b0b0f4071f524f74ed5c8dd0be3f101e6206847dd04693226733fe5baaf6862e6d36f71d3cc72d4dedfee994805304ce4c96f6eee79569ebefcd966b02f3372c1e6d3daed62c9b697b6b2db9661b1a5575a4f2dd72aff126c24d5b465823754be4d253e444a071df11ad8035d1897c198832b (encrypted)
Stealth Address
0c2e139df5f5ca06214f065ec06affafa83c1a9d18b4ab572bdf746342706e2e
Commitment
222bd66d2785041831f0a3cf8fd816ff67b5b82ee4eba8382094ee756138af6c
Range Proof
672 bytes (Bulletproof)
Memo
37fe52691a8a04f05c35c21e49257fe60d66d25bdd4c48c4f1af37f8ff9995ae34dfc34429571f5b5db08f8a39443abf5d9dcffb359d96ea46c049049f66389f469aefb92750fa318ffd454befba8337f2328861c60ebb9f1cb1262216896efc26f4e08077c22581ec37d5bb269c48dbd0f32cb99285d9e15bcaa328115214a3 (encrypted)
Stealth Address
ea3b5bd60611cfb84c54370bdb084374b97424369eea275290de81b7a41fab6c
Commitment
d26a10d84a720208f13f1b440cf385f9745c41530bf0fe277bfba90718733a09
Range Proof
672 bytes (Bulletproof)
Memo
279e722fbf3c8769e269527ba1fe7d0302d32e1a7f64feb3fe6f7b1c9f4aac1bae2feb34f0176d99200d7e752e2533e146199a7e10e90dd7c73e2dcd57a7f8bf169461fc6384de67ba364cfed0eb4eeb1ab759a481ae5c9122f90911080c2b4b8bb9678200b74513515dfbf779e6699aef6e355c892a4cf80ec97cfc2327cdd7 (encrypted)