# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
063bcd0d3cb5cdf328725874887ac11b16e14fe91b8acdb451b26b2b69bf8f02
Pseudo Output
4a3eb4c243791710938033c2a09a4a6f4789a86b837bdfa09b6e693b68801026
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
56556f7545d02b028d8bff1df749fdea11a9beadcc85f5f834171dea7b1ce361
Commitment
e278c0bf73de7cf29cc90b84855840f111dbf2ab26239dacfe8965d26446a025
Range Proof
672 bytes (Bulletproof)
Memo
402992ee626a2b3210fdd785d9889a1548ffbc21163bbee152732623cdd0a6dbc53f99b8c1ec157911ea282f9957622376c985398b714a700839210abc942d3aabdfbfc92c82c4db49a4fd6862962d50bd73eda1789c368b6e25e9098eaec533fa7db1c4d780bce9d25c25d81a4c1e2257c464c64f750cdfef87266710d1c65c (encrypted)
Stealth Address
d2332462c9b8261c442951be49bcbca349ad521569eb0b3ed814098732e2f869
Commitment
d0d35c41aa0a12888396d63650594077a67a414dbc4f6cc5bd2037524c93815f
Range Proof
672 bytes (Bulletproof)
Memo
5d2081c442d0c8e3db26557d89688eadc05d754badd26aa5437e525c1c81473dc14d5b4a750118ab7bdd4590c1573926fa306f181bd6dad793afe1f187655b39d57ac2f8288f4fb552b08a919cbf3558975f04c7dedca04a836c3619b1a309e26f5b962ff1980ecced337d90f3021862eb822e5bd375fa52b29a91f9b5b9736f (encrypted)
Stealth Address
2e4b0edab1a662b0660b27cbdc8812056c8e4d96dd586d04ca9d9ba2a5156851
Commitment
d02214351c038a329cb71ccba5aa2c3fd1f1b5044d2c0747826ad97c4726707c
Range Proof
672 bytes (Bulletproof)
Memo
19af2fa10f56793f2381bb8ee57c95d5f535068e4501efe8ddb656fb95ee77c7e305d399bb4ea937baf543ffca5eab792ed3e23dd59f654826e55ea541e785ccc8c628ca8249bef006bde3b9a769aba7c8823a29a920a79adb09e6e934424079f1beb08990ab32d32b759f14d41f9e91c64225719f56eafff052b41c859d13a9 (encrypted)