# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e86bd892ee6d88bf1518629f5a4f2fcf70000d03b66839a50b4881b286508e64
Pseudo Output
704661dc73229f0a8f1a76473496306ce8522ba7314d5f808e910bfff8fec316
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
78eb5bee147feaad137719b7a56b3c176ce56ccfb5284048b6eb3ea7cfe6ae4f
Commitment
0eb197b7bc38ed0232beaa613e7ba7f16f688f868e7ce9aae2024f088dac995a
Range Proof
672 bytes (Bulletproof)
Memo
ef7aa3a801e8ec2d3ece8bbaafa4a8e0c95ce2d2cff22e5d6996670b51efe8bb375ddb48dbb08d36c637f2a90cd0f620f7a1f1aa81cc1436f2617fd03c14a129a75cb633fe1b918ee0fcc4c13116213f1d41da83708dc39916f3cd50c515e7928b1380bd8689f21eab2f49ac190f4f85d88798e3bec7553edfb0959f58301543 (encrypted)
Stealth Address
e0fb7a93a68d84fb69caa986c772666614b4f2f59dd4e7b758459382af84b357
Commitment
86b8d3fc430ad0a09dfce6db4202666baaf68e0632660cd9db785bb2a219ca0c
Range Proof
672 bytes (Bulletproof)
Memo
b098ebb2bc42871f7ea3b5bee7d5a34346df681685be5cef53f37538ac302425a3225ef1cecba9d5d8245d4f006cd2acce9a61bd88e0c20c7b67afe250662578db3a5a3316aae118c312df2df834a47643aae8e5736a6d921fc97f6cfa5aad508b507f5b1126c999388345a02480e692fa92a691e68e65f4cbace945d5bc3570 (encrypted)
Stealth Address
f85e099fd8906c9447cb6df9b6fdf2fbc597bd02525994825879824879d4b77c
Commitment
123d4c4e76da4ff2e9bf004d7de89fe9ff89af6a03d7ada67ef95bfee2c7213f
Range Proof
672 bytes (Bulletproof)
Memo
1567f156723b2e695641e2c6541d190e5c7de22d17b1c48f8b75db831b8c88185df17702381fc295bcc74b4512cc780921677eaf683987b5dfa0a9d1a37dbe5d8430e992069fe51564225792cfeb3999ee74cd23a6a03310b46f404245e8f9e27e4018142b8ca70e821a7cf0a265f3e58aa10cefaa836ee202d407a092201fa7 (encrypted)