# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e633109f5775af3a8ca136c58193cd4f49e886ef25ad5cbd64bd94ac27d7bd2f
Pseudo Output
1e0591cb5eaa899f9c98180379dd3f6e989cfcc3edcbde91c85d72f165962965
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
78c33df48833478515694a4f552186d7c633fafcf8b1fb2b6724ed8d46b1672f
Commitment
c231482428cd968fbec66d9f6ff95c5e1b3fbf83f0d88b34ad84ae89046f380d
Range Proof
672 bytes (Bulletproof)
Memo
b18f486ebac956f887900d8fd82981564a4831476e87451f1858216d8926dcca9e85941f7cfe0f6653d50f202646f5b6db6609d9867fdb07d241ba25267d173b281f48a56835a8632f528d4b6aeb2f0e2a017a174181f5439bcfdd5b865edf41ad7e154eb9cf16686ad03581e8565678cf93a5301454449583ecd9761b5f3385 (encrypted)
Stealth Address
d680680801e5035b3305fcbe64fd9da579abf345f28d1de072f77686d6c67b75
Commitment
2e784fea7f9e5629a9236b331f9a84099595c695fe5a7156e9e09363bbae6813
Range Proof
672 bytes (Bulletproof)
Memo
a44252637f6419a7d750c9d7eb28ce87d295e7f805494b3570d0aa6b7b816a254a439b29d8e9cf7f250e1a618ba82206299fa7b441a1c2750fde4c67c01cd7a6074ce00188db6742892ab3d45c16d1ee8a98753b8567666e75fa54c1ab31a58366810fd4b35874fe6424eff31d0801e88bf1906b28e912e2f7d449460a76a564 (encrypted)
Stealth Address
169d2921fc94d1c461ed38833d54c8ad1a207681d89811a390cb3a1c9bfa9e40
Commitment
0a095313356417c8783e4e029b46cbf621e44f45846bc99496dad654e8a1f263
Range Proof
672 bytes (Bulletproof)
Memo
61b1b38946f3b179c248f202f4106ea85d89d66755cf4d3b0678981b7446156d33abaaa06f4675922eeef5762ac6742e4162746d49ac00b5fc300e6fcb8b84eec1c9010ec3ad5a395c8343559883cd410b5850581afceda3adb2127260f619b445d2b880d92392b6aaeb25635d2693220932ef9c5cc8b9383bbc44fe65edbf97 (encrypted)