# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
56251ac97d0aa76cd46c40d357cf635a4ff1f1e76ba713d77745d8fc0e90e374
Pseudo Output
24f93536b152aaf8a0bcfdf91233872d8a3aeb40b7009e236fc9b5fbcbb6290c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
929ab36490a16d05680246d7c5480a5816ca79b4665a6ed1dc089ba1c6a1f461
Commitment
b631b33970ee2257198ab7ffa98d2bc9ea0625260ce1d8387c7d0d1104f99c36
Range Proof
672 bytes (Bulletproof)
Memo
0d2c3bc29e292e147b1b4a678c0ef6f5017a7a9c8cb94459a99f79e6acfe14f2baaf40fae00644b09694d4003433c4a44cbe21e2716cd98da2fb1d5b0ad2aebdf7a22e80253ab94ef65d67edabaa6f136f1ecac20e4d227ad58a79121ee3badbc434b16e6592657bd57e2f292138b4240d1120ca8e8d4355b2af70951b577d7a (encrypted)
Stealth Address
2c53d1a4cd71e1d8268b791b58aadec111fd17605b2e51c8af606a06c99d8769
Commitment
0e4f28286e20366104ab6c1322c470336e9a826d478331ce09793901220c2317
Range Proof
672 bytes (Bulletproof)
Memo
277c5a8160dc0e0ecfa8b83554e923dea757852ebc71920b0394583d8fa307ceeb2f1ff8e7def54400444b035daa9e202140997d6fa29cb89ace3ebb332979fdd982c9b28b749945821af567061af9e3adf6f40b67b04088fdd5d0180e1b9af650648f36bb92e8a46c7d828909ad2b9a689dd66abdca46dff1e999272be58131 (encrypted)
Stealth Address
f08d0220f9a492ef65b214ba2b212c707b0ceb5da408ff0903d83b30f5fb5909
Commitment
988bad6184dade21f89e7b6db1c86521a119f6e7534e95450e5978b549d8b001
Range Proof
672 bytes (Bulletproof)
Memo
e6b8cd53b3e04ae20b33ac2d5f8e71a51fb306dd7c7ca05a7e8646206f6d69ec42979ec5849520f38ce118ec2316046a8a7e5d492dfcfc7a4b11512bc448f195d0457efd5d7e0f8df50a3ec18374a23e27c8885df4d429fe90b7b73127afba15f9d0c4372821e8ee3480bd477791430fccbe70027ba9b7f0efc2c009bc854d12 (encrypted)