# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
56471aedf66c0140544c6333d0faf41600072bdda21e7b049642eae0a740105b
Pseudo Output
9a31ef20387053d39aaa7f9b8ae69bc509485999aad386078874403d9155d375
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
789ff88260653529a03f4ddd7e538a46e2106a42af44ae7c5c5acdac7aaad105
Commitment
b20e14e355b8cb907c42ad09526ed228fd7c8b358a2a068cfad21c08d6ff7c07
Range Proof
672 bytes (Bulletproof)
Memo
bd1395d2cfbf1a69187558cf674f54046bd1383f094256e2d82090842a91f39ef9d2715b338045c86b6eda694f24c1cc31288be1eda6eec78dc99d25f3a59350f4313aab26525fd60b7c051a51395d2f7c93e1d2ae1a7542619db5209775bc74d48bf7964d4c02da2ee0d20b289625bcc069f44938436ba09a7dd83f0db2a5c5 (encrypted)
Stealth Address
0c0cca68259d392718a0baeafa0b360e4c44d40a2422742f8415c4e2453e5d12
Commitment
52ad656a3ffda013cce9464134b9969b07480daff7d80ecf52cb7f7ffce4631d
Range Proof
672 bytes (Bulletproof)
Memo
309d93a3d1f9fcd92396820ab67bc37ff1b696ef3278c52d5a09cbf0be71b5fd665833255de14ed3ab17215eb1d7a6da6df5cbdb352afb2ec63e4337d3111e885b8e311f533dc433345762995b22047be267bf09a5ddb83d71c572a3e2b242a47c13f8f427abf28c41a1c2584145efdbeb4a3fc366950dd9b858852fef2f69ad (encrypted)
Stealth Address
58a0b97c00f98363429ad1c5779599c8f971c58a55cb05022902e7e68bfd176a
Commitment
8620218826407f6e0e0e048bd0344cd224a1c4d93a99432d495e3c72455a0513
Range Proof
672 bytes (Bulletproof)
Memo
d7da4c06269ca7873bce34571a85a167961b676f4521dd3f1789bd0031c8e5f2e4d54670ad90df962069d2369ed8f853d1d1f9d72303e19db1fe8955b5dc678085acab670dfeadfd65503b8160866e442401ca37a3d216168a0c2e3041c2c174962789e4af80987b935781097bbedd0a40c7f8d33373de4ec11f56a9e35d50de (encrypted)