# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
924d8071b31a50bd9eddd82e9d39b103dec5162901deb1dcd2f7eb942afb8573
Pseudo Output
a8a0d3d94d7f26032d3f7a35ce5e011df33bb973c116f8e3c5b50a8e38c95f0d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
56cf21553fde8f6d7c6aa149ec39b8342209f89869d2bf1191de838a6fea6212
Commitment
b49ccf6f5362e5ede6f496634f4b6834e2a0308a0f6c535e8c650dfc7a6d031a
Range Proof
672 bytes (Bulletproof)
Memo
13a1f058a63928cec968f323cba74797342f1c9ff174a6d59e20a5ec8be7105847a709087811f94ae47a9800cd11f1bab6e56101536dd86fe3b7366ee596a26b402c296d18b619492d11cbb7fc561eb8d20b0ff487bc2789403fa7aa3a887c1d55a99f95ec8a48a482e05a7e0f13a285a3e87c5d3cfcc6c4ce398092a944386a (encrypted)
Stealth Address
5a5890c11298d4b6141de54fc72d097e4c5f6794ca85c21c0b222c7c29b43230
Commitment
08d2b52040b7dedc202143a6a81115872cccecbc0eb4ea7848fc45b58fd95675
Range Proof
672 bytes (Bulletproof)
Memo
998ce666a215f279b0fefcdc046ade1ce6993313ea70d69f6b17d29f57c6c56584abc043899539aff80bd2f87aa326ce9a12e1561f10b3284d26de96447127e9888dd5e5745433611164be5c1b61dbf2f76751c941cbda2b45ab9f05be7562faf6c9aefa20b7c77c0ebbbee768bf1098e8eb66a7a507748e63ef25a57eb99d61 (encrypted)