# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e85890308b26abc3af207f595e7539bcc5e89426dddfdd1b87a77691ee4d3514
Pseudo Output
66312ef3c24f4b7ddacf2a3e9baf10a61ae0733a64c0d11f92e7b773c7586235
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
56747cf40cde663a4d19f8cdef4d39b70e58aee94ac8045ddbae14427c35c93b
Commitment
1cd382ab7b04aabe2cc0bc448e9b7b6b10eea4d7b1c574a1813d735e069d7b50
Range Proof
672 bytes (Bulletproof)
Memo
4cd0d171866bd9132485279d582cfece3008c8e7bb6ede7090ef39a121d61004e55914f3c19698bfc656ef36026bf9989971b34eeba43e7d8d899f159009eb6222e48df7c948269c14df3af0bd3768c71c47b649f73a23c84d23f5f3d81ceacbae0696738e358d1ad9d7e292d78ebc81bba99a497eb8a337a4001beb6b05423b (encrypted)
Stealth Address
56e8ac39ad8efd3a0a165ab0307070c3ec4a8e02fe6f7da3aeef290d2b668e69
Commitment
44c99be28dd98efd27117d646939a475de0c8858acbf3b134430fd16ccf21d23
Range Proof
672 bytes (Bulletproof)
Memo
bc4429fd046293584135c7f4ddb04589bf28bd4fb45c8f51c8a4296242bc78b27f64de1831d8838685a23aa23b3930c3a4bbec8aced7113c3d00d25d3ec6afa9f1bb26fc17ed4beeec9b3c75fe80266804800c5ee0abcfeb8e86d06534f2d67a7cbb6650d87ba99e919c4ba3610855a318b968459a993f335a91c3ffd2616722 (encrypted)
Stealth Address
8a7bfe52a7f17ec4b39f8d46b9bbc88826d24b537958ab150a1f721c3227fb72
Commitment
a292ed8d07c216337212e3fb1904064af315f024c1e83a7bc5f8e211f05d7d65
Range Proof
672 bytes (Bulletproof)
Memo
239e5d2a73c7841fa64afb086b68d54a70e68d2940fac9730dfb220da8cdd0051d958eeb81802c7c0cf6e83f554babe5992326ead25178cdd9b8504a7525ef8266c959459e45c3ad397d550a340a2bee094e91fff7b879c6becfbd3595e109445a94ebe3ace9f66d19b4ba18493eef1f96bb046cd39633ae43e07ae3d90e548f (encrypted)