# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
487b64f5d9276f1e6bcce62a4fd3c120b2994414612e8e35a466e7cfc1f62a66
Pseudo Output
c2cd503af5a6c61fc444129a300b7f8c6b1cdf70b9e75238bd790c62f2e80c55
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
56ac1c050312e8d3d7cdd9f8765d309c42386d0659bf77555e1491a0f3c4651e
Commitment
6e0fae12aee265fb131d1f22d2337ae995a4bd7ed8af0f7b56127b9a33bf235e
Range Proof
672 bytes (Bulletproof)
Memo
49f6800e612fdaa74017c9029671216799bd906982e73cd5b1a31de43742a02369c0b4761e7a3d74c02f6bef12808d656c5b32440eccb622e7644146504f6cb9e6341c832e924a7e56ba2d148750e54f15b43584ca487e444860e707405440da9dc9379983efb2e81eb26e932a764ac9b06d9bfe90e83b4da96d820986efcf2e (encrypted)
Stealth Address
d26d0dd2e66b5a497854d34a2074ed2dcb24601d2a91bec391c03da766246d18
Commitment
26e54422a7b13ec79409fbae3a09458c8c9785a9851d130444df6ebe0f7a051b
Range Proof
672 bytes (Bulletproof)
Memo
3348b5a8a3593dc89314d1aca5e5d550676ecb7a9350be059a8b680570f9d73f55f2f889f78807dafcc9bde62253fe5721e4ca48dea798d61927054e572dead4a33d4a1427b6526807ba3bb0f04f4e4fbfee715b79763bfd0e726c20a589c88db49175b802a5bad19095a04bcb77b844beed8f12e0f74122bcc32ad61d9825b9 (encrypted)
Stealth Address
880ee5352d079de71346382e974e2cdada6030192001b1b43ccb7490b0032f11
Commitment
ac8189e7167bc0f5965e10d6517f6be9c102059a8d9274e84e99c8f518456a2d
Range Proof
672 bytes (Bulletproof)
Memo
1071c6e95e20fa6da0f6c31e755e90ecb4cabd5b8b24c97636ae59ab43967909f3bf9b60112ba2d4df27417e3a88e03f71f9dcd6f328b39cca40467040963979a14ab1e46b64a62b87e67767ff4b0fc0cfa8af057eef25dc964c8bfe8107b24522f6e883fb2ca1745f98e080c34d0141aa48ac3e76ae5b644e9bfda102b647d9 (encrypted)