# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
561185511b0df6ae80f7bae100c36a3b83c7e137671da19e201c5ca923354212
Pseudo Output
56d9aa6d80279131d572684275f24434bb75a69628b32f82252e10a23d33ad01
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
64fa1dccd8f1070d9b17fab51947bf02ec7239acf3a44bbcf68328641990a91b
Commitment
8032e27ad0e08031c5e19c58b7d99518282d9fe481df9ad716fc8a2432c1587c
Range Proof
672 bytes (Bulletproof)
Memo
12b6a31389bcbd017664aaebd50ce94326841620795f2e5c8247206595c2c36cc152023d7f0b371f785131f0207610cb869e96e725ff573f84a9fc0fb87b0d95c7a1f347168a7c1b11b71f004731d7209892b7d6ddf5eb6cd1672f63072e42cb1a5854e2cf23110cd50e5bcc68400b10702ef038f5610016acad945901dd2767 (encrypted)
Stealth Address
b21884456e9896a9bbeec85df149fa459e6a1ae7685428efd80dc619b756241b
Commitment
e29d5a6a53fc28a7f261c6df606570475cb1282336aa88df76aa21b3b29af971
Range Proof
672 bytes (Bulletproof)
Memo
c415bbc3aab88ddbedfe94885d74e47810602f36c831f0f4bf7f71a90ecbd73461b7f03341c3a4433d69f23188d790e348a8f3f466fd38a73d7841bef0fd768200e8e6e6b8ab2aef66815390c4678aa72783afb8f28da3f04cb40065bea24d68f608b4d9125a63bebb58dd6f440e2022d97588c02a2af2cc839dd9d1b249e00b (encrypted)