# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7682a1203ce1b29d9628e968dd4f7ab1eae0809a943d5488c35df829fb17c919
Pseudo Output
eae9ed60e445d5da94bfc0d0268c52d72e96914aeb8a0b4e6182f41758569a77
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
56d4e2c96b9fedb842ab955aab51d0d51361e9c0168e62e671ac41bb5b55a30b
Commitment
94ad7fa31f05fa797a21ad301314d38381b6a7080f01959645a92c08a4eb4f4c
Range Proof
672 bytes (Bulletproof)
Memo
86e513b630f41bce4c348be19bc22be85dad2199b2307d04a01b7fe365288aa1f2505a404dd04614a0e994e74af7ff53add7c15c711466d14124bb223fd0fb031977028acc572a4bb10a89c536acb70e8f409b813610a154fe1569e046c8d49fd810a87f952045db766c3ff7df73a542217cdbe59d1a6fef01d8c17281889350 (encrypted)
Stealth Address
e4cd17e4b50fd84d630e324be09f09b45c0c457353467b72083100ad8e03333a
Commitment
dc09a06c6d94fdc9d5419254a201ca24bd358193a98c30128b1b915599422c1b
Range Proof
672 bytes (Bulletproof)
Memo
3fd986fdebe52e963c06c6093ff4b1d72a6e62e488b2bf0d4600bd6915bbf51aa7c7c2ece00c4490e8f7ecad4906e1f6f08bd1a43e14b53b0e1ed05bb00827d82c0a9b374d8f439ba51eaada07c8525d8d4ddb4874cd4b1f9d74860171b4dfaa90a18d0952604c868b39c1aaa5dafd01ceac0de8f14b8b6079e5d868d9e2c10b (encrypted)
Stealth Address
6c0832260b01ea32972d3b18cf847e56dccb070dd6ac14fa5b7f9a9cc71e647f
Commitment
00e509cbd486892a2fd718ea7fa2a633c567db7e09ca4fd8317c3a3fdefaa175
Range Proof
672 bytes (Bulletproof)
Memo
313c54502b93b6166943ec58535d47821e5e95da776dd4e85f513ed0ce963fccca39514f228f31f71365e269f497b6b40f351b43e8ae0e73e33a7ae32a2a9b27a197ad8307c54a1f0133908ce2df2473b61649809692e85fa3e9d0d7d208f2546a043263e6c649e0a4162d400e58983f52268263c6830c162ec31c10f912b755 (encrypted)