# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0c4383603b7aaea0629904bee20161423c6abd1af6ff80fc77536994f2d4b87b
Pseudo Output
78036a0238e798167797919f679ce69f2f8fe7041f286e577dbd7c7aed89924c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
56e89d297d3d668dda36667a1f6bdb85186ee0cd4b3b8480e8f63e330fa88747
Commitment
56c60f7204cbdf4ea9e8ac58276014b30ae04ca836c38864e63aa71cda98f432
Range Proof
672 bytes (Bulletproof)
Memo
dc84c2ae1887b77a8074f51e7a463cb3d11f21c05a814bab0c07de89a55011a99114753f7e97c0b37ba380187d7cc8c4a4065034bbc86baf83aa565e5779f97b01673a89993eab3b4c1dadbfaaf0b32959bfef2964cb54f1af6e0b4913c44d74cd8ea0fdebb3cc930f3ef6e2b3a3d9bd93a1a40f06b37004b8de2f31e3e4884d (encrypted)
Stealth Address
c68b43900c017c4a33bbc421367a563370b80268ce36c548cfebab1505eff95c
Commitment
b2838b579a4753e96adbc11cd7807ce81f1ff537e015e5c299cac560e499121d
Range Proof
672 bytes (Bulletproof)
Memo
69bf05b5b3191ade3e19581ba7a55d18652bafc0b666db21924008b326465f3d7e52605c89c9d18e3bf216cc7c8468998034305d7bd3cc5398d7dddc7752ca7a33a11dd22bfff69fde2de266b9f3af46e2f00be037b92e51c581b6ae22e062c7ab3a547af390688c4c48abc57566fff30e420446d47e12e45a157a3ef3b80082 (encrypted)
Stealth Address
0ec3c420cf03c1426859398d54ac8126f2441dfc877d12fab90956c9844db216
Commitment
6e0748fe6cb9c04c2580b999c3d1ce3fc12b113d095d0680496ff49d27edd86e
Range Proof
672 bytes (Bulletproof)
Memo
9cc74c922a11fd399e5de7422ab6625a7eb135caea66781589535d4cc86d7f678da4038f58327551f8cf9defcdd6da2b6474c6857533f7fdec1edd00682c3bbe661b73a285a73a667951dcdd3f2b821d248024de87f44dc533e74d88abf2fad412fa3b16256bcf0b626c4d17a1846d5daa48db61346784b7997a11a59976d211 (encrypted)