# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f0c2330ce6bbee59898de0d34a913abea7cbc69c8e8065c56856323c64d58141
Pseudo Output
a0bf17ff2b94cbc012823cffb8279039ba75539bd6971bfe6cdee2aa0bef4b15
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
56752cc1942df719a7929994bd3054324b686a3f31e272579bbaec1d236c0f24
Commitment
fe22a52fbc7177c5862a240b170b2918fb15757f1351bbc6401e3468be3a6469
Range Proof
672 bytes (Bulletproof)
Memo
89c56d91d74b4626b0f212e2129e5eae95d8eff6f3e673beba10f3877e81af78c2dd900bc2b55459aa38614f333bf7da8d7f7937d9651f759344f4cffded350b9febb7c6c07fcfed52350437695cca7f16446b97f80412134acff0cfefe80192f28acf8a3036ee1d11468bdc52f84d06e75f55b812a84492bb5cf37f45c6f234 (encrypted)
Stealth Address
e47007e630e13a25dc2064c447f71bed0374f1649db2080bd31ca589494f996f
Commitment
56efc7a8194f265a997fb63024a22cc5733099263056d9926cd11c77051f9639
Range Proof
672 bytes (Bulletproof)
Memo
27bbc2df4bd5e7e827ad15b7a5fed3d4250b61e448c112a0f8d0197162d0b62a6493ac01ae5b39db3d2ec9df8f95bd24e27c5aca56f5603650f1dc67851982c6a6942eda252b767c0bddb75b479f956e3219ef4fb5d4c5b0212eb54a98eca0a6531757ef5f57606ae70d594a30d6f472e1eddd005badb2dbd881128fdcb45ba6 (encrypted)
Stealth Address
b4cbfbf6f7ca4baa119dccbca7d6fc1b8d34418232448e3c75180a615095f75b
Commitment
c0ba564992302ca64965ffcd5cbd00f02e94718cecdb21af726b9f555b592947
Range Proof
672 bytes (Bulletproof)
Memo
f31eb4cf9f9214470aefdd50f0787a2fe3a329d4a99811d6461346144b65b9dab6fa2cae432fed7c461e3b1a221ef5762df434a623f841c7afefb6cad0c407095819ded6c3a794661dc98ad1f1e56b16ec38c80621dddf57e047528ac1b84d289a73e9e53eb25e68dbc9448ed6eacc5ef4a53848e9f6333741a7f5041faf410e (encrypted)