# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
56bc56818d4eacea0f3e7fe32660af436ec477d96069008b5d33ed51f5eaf52f
Pseudo Output
504ce42e0c315446b546df13563c6af4728b79522ab86a8a3c35652adb8ed55f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
243cfd53fd753f4cb90e512c083e4065cd94bf1e2106cff6d0a410451fbb1b57
Commitment
a8bb52784bef069415376bf26a497d7f19fecfaed3ef13fc17fd712e09446918
Range Proof
672 bytes (Bulletproof)
Memo
c65fcfa51ed842e6d6013ecccd69159a4935a2408caa6de5f3d197699e2632161a9815205980e779cd2d81a96af3a688f22f456445006573d15f001c5c070e9bc70f9d4c105f6c2ff97116fb9592f2e148f114b12e33cfa9741adcb1d532f316a08b6290ebc465ea42f8aaea88d0dd84644030d4c56a542346049719bd397fff (encrypted)
Stealth Address
6486c567c2686fc4fce56ad147766a2790088939458ba373589cc9b41bd1f513
Commitment
6eecf806583026634ebfe53f5dfadc85586ba8524bb7837150de1f5b2e0f1b1d
Range Proof
672 bytes (Bulletproof)
Memo
49494f612634317e4f1e88c14598371d28f9c3611941bd22c48d888d0aea8ef3bf0f64bbbe2e0feb1b0b03d0a6935af91b22976dda2ce80f9adacd3220a5fea8808574947f8c0d13200ede9f5b5c0b846e110470f10cca06b34b866eabe62c3a195cd8d3442ac683d22f0591c88528edba08bafc94e5a4b5aa537312bc6e2d0d (encrypted)
Stealth Address
ea73865a04d571f4efa4d21f678fa64a83223fd7cf46d16365f07a68f2aca85f
Commitment
800d62e4353a42a0f8944d175554be9dd900ed753b175b03b44d28ef4bd33267
Range Proof
672 bytes (Bulletproof)
Memo
c8a05862beed3026dc7953b8db2116d150ed7d8fcbe834609b1ffb3e6fb24c66a9f95794e4dad6b6165432c9900f3b0ba3d15b8437a2d2674127534ac4a5bdd1722bb70ef62575537983d010c8f17a2387c0ba69e370e35924660e6bee5c9321e85469be16ca69652d1e793c8bebfe09843901ede92c3cd2e753fde67809439a (encrypted)