# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fa6db57a8cf9eef09d2ff0498bfe66fc7cb68cba7fff27558304ac059640a216
Pseudo Output
56731ea4527e29385aecea5b749f51d571ecc62075d67d1a223c80cb8d51c76b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
522fba1dc0d6053d6b22c767fc282fed048a4552b5a68456b4f5137ae074177f
Commitment
68734b14153713570617f3f54cb4a02cdb379083fa64b7c73df87b38dc24c413
Range Proof
672 bytes (Bulletproof)
Memo
8dcb4f65b1ec6d10e8077e219f19f7c54c858e60042d2e9a326a2bcfcfff9724fc708156c4fb58939d2b31281044087e7731b45304a07883096ed5c693e2a08815dd87e5ab5618010d19f846b818deae57a4b0db5f87d6a372e43f7075b1eb5133032e65836c244382a934a2640d357eaaee7d4c283c03de643c73d4ee294e10 (encrypted)
Stealth Address
5083453af3890b5df1a788c00af2c7d5ef8ca819025bd5cfe91fbeb7c3ecd44c
Commitment
b6ec073e52260826feca98c141496e6cac4b53165638b0b064646c943e52df79
Range Proof
672 bytes (Bulletproof)
Memo
6c54a959d1966562c9a140769e1ce8700a215f73249a7d62958c5af9cddd72a7c8dabf47f3932120f0e903444efa9355662b85e181866df55abce8a1068476f00af034f3fc0121134bc3ebe2faf342f1b42a2efb97f9df79b4d4876d6c0285d6a92a2e9d19171ce8334110ce0de9371c7f5d7465d18714fc1f93da681d18c8dd (encrypted)
Stealth Address
d2f57eeb7d7728204293ee8b56e7230a7eb40eb1c140d45543e103a747d6fe33
Commitment
7ecdc6551438aeac8ecf44d371154a3d382c4144f280450c02958808c6465c5a
Range Proof
672 bytes (Bulletproof)
Memo
d3b910ff58c7fd034b68821da40dacb22308660df8a9f3b459cc186827bcc59a3230ab5053fdc56fe7c4ec983aa37fc213cfde157f08dea6aba1ac84fe4bd837c9742c964aa70aa7f6147e0e03db182854c9fe61d1764c1389d1df297183f8535bf679920875ca3b944ed595d8d207cd22b6ae285c845036c229a49841b405ba (encrypted)