# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8091592b21f190a8d4aa21ee1eed52474aaa7b0a1de499974fadbf281e17471f
Pseudo Output
ceba34b5714216fa5d81365446c9c7135d1f26be5e1ec5d7bec3c1fe9c734f20
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5606ad3561c31edfe47ce208bc7da33383f68932336e752bab1c3432a6046715
Commitment
523559468ceb1075bcf89153df397f9e36bbb2dd54e748c101a525d617341c6e
Range Proof
672 bytes (Bulletproof)
Memo
7a8e7559f791169d88757eb5377ef9f040625b8b571a5ac24b674816f39657407e59ee5a27a1ecfecdf4bf9c637575c3cef67452ad94b9b47ad94182611047b75068c2b987754898f825e186ec2c45c4144f0ba0ceba22b9f58995974a5e5b1f62b608d5ff445802ee780aae17276d2a209dce439910717eb84217803e7c31c0 (encrypted)
Stealth Address
d858c63699def88d908b360fca9b4621d8cd45ccdd1942c199c15857ac02686e
Commitment
f69995b857732ed193c79f05a1744c997b98035ba793e416e86a88872cac7440
Range Proof
672 bytes (Bulletproof)
Memo
15b7c85b20b6864df1973d0608f659d57d586c6d480e9d5dbf19da9c8e38b06e41d68e71c93d7f9d22e784a8c6c511e42f1bc4459da339b5ea172935cd8300c5dce2281f5c75a88efa4ab92d30c1e32206ec0c2196162c7bf95f7b960a08fb5936de3868f52eb1d049e0c2beb72530890ab37e7bcfa1679091eae03cc9373807 (encrypted)
Stealth Address
1a0adb31110fb9147fad7df67b9d4233d0bbdfee2dbbbbeefd60fd6760dddd14
Commitment
60ec400803fceedbab450f0d07088f5bbd4d8845b28a04a4526e74444ee02d38
Range Proof
672 bytes (Bulletproof)
Memo
824f8b85a2cbbe2085959367376b5b53305da6c244664b949da3f3b320677407e6289614696b2a2695db7d965d05f24e89a9b26fc10be96c579236ed53d98edf65aa007513f6f03c5edc49465c81b64f7f0778e04018380c881204642cb5cea4c47a582d8570fae700d14386c43ea6ccfa573878fcb84bf79640e1ee3357c16e (encrypted)