# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5ec6d6fc9352764a348740251058ab3f52bde25095e83ad49e942360d2161865
Pseudo Output
5c7bf37330c90deca4f79660cfa87061b082f684be647124fbe4b7e1cfcdf540
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4adc232f2e9fa2bb433f5b9b7174a94b070fbf6274fb21366442dc5661d0b834
Commitment
56772d089e0973dc2106e6aa17b4b7657a740492bff2a426e92f89dfa977e23b
Range Proof
672 bytes (Bulletproof)
Memo
a7dd2b7bbda81e78053a07dcb8d9f17b9b05cf669091ff677b14d6d527c7cb532183e8486e8328e684682cc109204b4b1cff46dfa3b1c6ca67f43084d12a93fca315a4d56f2107d808330588962ad7dac91385e7ccedc46da57a776d6d467154f220bf1aa33a46d24783b15aa617c0f21d14e9564b1e141b94d1490c9c40e82b (encrypted)
Stealth Address
62c7ca45de91c77685d7339659ad166ee6a1ef3281ef5bdea85173787394934b
Commitment
5c0114e53ff0d2f12ac4f1dbb3b15d92c1186f3404d554ca845e67babbaa313e
Range Proof
672 bytes (Bulletproof)
Memo
468fe5d085c75442800f3761ecc03a233119b4d7a6e232cb584bfae7e125a5bf39786c9ac15b8d011d4ea8be3c520bc039496a3719e9502dbc58cccf862d96df9e91b09a8c4193bd60bf16e6880c69b1e22379b5eafbf58b70504ffdb2919a55c71a707fef28e884c645177f08b4a32a95ed221f4714fab2f821102c1344a9df (encrypted)
Stealth Address
8ab18377b582c427739109c587885ab0b2187c6381f4e94b67f0e502a1c99635
Commitment
149f8be81924d589478c82216f0fd453ee8806d2affd5273440509fb98cbf422
Range Proof
672 bytes (Bulletproof)
Memo
023efc69b6e99bb37dadb62667002229381c8b24746f8be0be24f30f6a153c13d6ee891dfa2b12ee4695247076387e1960e4c912e3604b4a2bc8599b92264949ac3514c45c705bfe9dee274c68e60595c76a7091d117e60a2cf157d9e1479e8840744bf519d173a2a7bb73ee0115260aa068aa89ab5bdaa967646497e6882ebe (encrypted)