# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
78f8a7cea15519c3c7a43eda173e8605254bcc7afd741eb5f0bce7ddd9345f4a
Pseudo Output
e68c6f5c8d52a5a2732017282f209323890ae3c598d3683351ea90d3177f6d54
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
326033b15fb496f6c6b88dbad63db6fd1ca93998af4a9e14ac23f27425d16728
Commitment
281ca98f0d94d3976dc66400db7084087e1f23de77aa744c9480c65f5072ad3e
Range Proof
672 bytes (Bulletproof)
Memo
24432b75e91a2c2486f2e8a3dd7af76001ac7bfba979f7ebfb69e96f3ea1af6cb62ef8dd5e8e179b1b93e4fd24955880e5d6b6be0034b05750b5c1d67d7c40c923cf2b2e327e3948528060603fcb169fd63db9ec7d12b1d89b515c1ca4e6ad7f4b471ad4e3f71c98adfe44ff94707fa1999bc5d74670d97e6152ea342395f72f (encrypted)
Stealth Address
42b379df81c244cc9f650166ab241341e65d4673b6c6820a56fe3fed349c7f13
Commitment
366af949ce036f5bd63cf1c3abb4430ba20f4baa718d2a0187b5289a0f10bd74
Range Proof
672 bytes (Bulletproof)
Memo
997f044187ffdcff27c34331ed4e4c01a7c07004e1f2eb67fd5d014b9e0546c8534d0fc840d4c07c73c7d647f37e2e6b7821a498d71e2fba6636c085ebe7d6a5a919f02cae4d723d87ccafeb9716ebd40aacf19d412bd45d92f8e578f92547ba3d1b30c9b7e989689d942fc127d6e5cf21f3b924c1773bfcbc4f746ae5417351 (encrypted)
Stealth Address
be6592314880e17c3ca2d05501c68124e753607fc1f2c218ed5cf1279cab6d46
Commitment
9897f1029a34cc8cf78895147932c65fa7c1917d4be1e81c6d509e45d890fe38
Range Proof
672 bytes (Bulletproof)
Memo
c8fcea607c14a673990318888e72a0f628e4f8561674ed8ae75d835021af0a85e7455dca3aa9e63a1a2a78ed52e6e208a629de082641cb6149deb0c1c62208355846fcb2ef171cc05aaf26543516beefb40ccae87f53b80adbcf4d4140606dbf73eecfe182c041dedd84e42b4a535befcb588eeb0d2bb76d5108a99cc0f382fd (encrypted)