# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
963050bb8fab5d7d7a7f54468e0719886e45520108a590b77682e241f9c3312b
Pseudo Output
163f39b4d486c21c20deb7fc4fa6feac3ec97a56abd49e8e394acae05e44c60d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
56cfa7b24fafabd83d7b2b8963aa33f2ea83d432b68e794be1b29d991ab1fd6b
Commitment
ceef9e6dc692a281097de9724df199494bc7f7948d825f94c403c4ffad0fd07e
Range Proof
672 bytes (Bulletproof)
Memo
74a81fae0f528c22b722a67407cd99d780cb7f32d1bcb7bf4b358d7e03e90b31dc9edbf6146b6f2be00912c12569d4d6915b12cf418bfdec714f703c0e3261969258e02dbfad64c77f549700e98a8d3a49f68cc28bb58814989bfcfcf2aa19e81062aa53f88b55645d343ed45aef6a391f9c9e819be4a97c5f8677874cafb0e8 (encrypted)
Stealth Address
369a503010921a86ed9670aba6fe8d43731e3d7168bd4d6055aaf15142e02f24
Commitment
3c11183f592999e36c2c701bfa51a221dbf53002fe423e63e75878670070f36c
Range Proof
672 bytes (Bulletproof)
Memo
2de32c57879656be05e5db8790fd538a6afda17e07952c12cd5aa9c95fef18aea7de1d64ea9b451b2f5db28ec93f47248896788a4f1476b3bf316643e094ad4182bfeca1545b98a5b3d67d74496060f519455272409496f9276981a5d87af33f4fd8e07481a24f6ffe85dcbcceabd7e7fb7671ba5093317de3e9db7f7bafceac (encrypted)
Stealth Address
d62d4a33970ccdd51f7f208e44757dd94287813d050761c24bef6ee32809f267
Commitment
cecac5a7f57481e4f2b146783328da726ede265f04ff92d838cc2c00401ac453
Range Proof
672 bytes (Bulletproof)
Memo
439f9c6adc6b52cddf63599744c718646a237d060724dea4c01090edecd0b926886b135b87977f0164461e148d930b4c73b738899f1542a5a51cc37a7c58649485149186b09a54017972398a75d4c96d97303e893a6300888bfaf9ec182a5ce9a2d0fdb926c42ecab52ec0965c9ae82453afd0ec8cd6d229aee6843cebb2b459 (encrypted)