# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
56fd2d64f1e949bec3d8b555b211cae193f776b1442b50415c846e7006e3d750
Pseudo Output
20fd6cd155bc0c024ff4555afb175f93af350e9e210827277ba6f6ab340bc532
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fa2a539d1d12e7d9d6ffa3610b0842a0fa4658edf6824e047392b3eb9fed3d44
Commitment
00595a6b28e67cba8a3a4df3502629b6eb36e614979910e4313b6d93b845871c
Range Proof
672 bytes (Bulletproof)
Memo
7ccc003e4c1c1ec808a7587aa39b2d1e52e417b538411ea16b33ae862193eb7b946f27559255eed1d597e43ada7af14b61d467ddfed92d518aea2dc2c1d2a9c183ca772bffadcb731fdcf931dc59d60567a1d61b1ed6353484702ee3e02bc95e5659b0bb61f812b89f751a42cce7f67397796d7711a704ead59a2c7c71050cd7 (encrypted)
Stealth Address
54a89be635045162cb68c0dbe5993e9dd8261c05a8e8e0222f18369fe607d150
Commitment
e4da41e95f4972ad5a92e4f7d1feace6e1469b0acc89a3dfbf62fe69778ff56a
Range Proof
672 bytes (Bulletproof)
Memo
a425ebbc3c543d8a86bf9ddf58cf99f97bbdc1109c392e74b15f2ae753240c4a42be053d5a400e8363297438a04e99fbc38351af3c20866b1aeaf3b7d8176c275388502e0cf20aaa273cdc5335cf4f58655888c2371b1fd35ca1458ffa921f0e32c7cc25f9d44715ba4f53abe7b46f97862f533e495d0c7ddc55722a35421daa (encrypted)
Stealth Address
b6c5930b5002781b040e3b30ab562ae0afae14034754bfd184cb82adae6f811c
Commitment
a4900fc0be6bcd51baf2aedae0ec1466bdc8d27acaa00ed4dc8416b92d84e02f
Range Proof
672 bytes (Bulletproof)
Memo
f2c35197751aa7a7932d86f4b8aa31d0a497fd650223f4ee1ad882ff0877f8bb621a210403e2de3f5967813a4330018c6f493b1a48498371caf3e575f0593a0a87abdbe5309a3cf1af6fec25e6da83edffa49522a4752c0c38cb8512f42eda2c3ac8d4fd0ef0ab6bc8a764331852c652b1268276180b37c0f6647b70fe4f4b1a (encrypted)