# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
78c7ad9e13f64b70dba447474b5264b48fa9c3295072b07d9b0e189c1ccb520a
Pseudo Output
28b15202f90b6649f2c446be4c3b7139520fecb709d80e9e21616b3fcffb8f6f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d808b039acf568f573179bdb5ecff966b5c5db20ccfe86feb44fb36e7c3f5761
Commitment
061db0295d1c88ee47103eb6eb360471cba824442bf54d63ed7d81cd7302084e
Range Proof
672 bytes (Bulletproof)
Memo
f65a3d75d12141105841345eb75ac7ffe6452879e8ba80f9fac7af0b88c4c3ea27944458664868f8846bdd018fc9933331bf5c6e0e5d7279896c6614318563f1389bbe7bbb1b2f2ac1e9364e02506773fa8c40c126a4660e2ccca988c9299f330e32c1c3cbc7540e96dbc217d9d7acbd22bf885cbc7a30c577ecc006ace80b45 (encrypted)
Stealth Address
8e9f69c597076dc6b6eef46156bf00e2148b87b2590151f971bc6d41bbb0b876
Commitment
1879a2269430a204cd7abcee7e5d1bf6458f4e989dba9c6c4c4eafbfb45aa94f
Range Proof
672 bytes (Bulletproof)
Memo
3b641ea9f06701a1eaeaab37586cea8bd881b46e63ef614e6a40064700cb080305dc54939c4404fa50fb1e243ab9f3da662a233a4017d6ebc754e63502a686d4eeb749c651b6276b8f6f7cd3c5fb56b03f4bd89b0db349ed1a3cf173b1e0de374587d8cdb775ebbee6501e38bfefd7852909e36ffdbcd7a35f74cf41538a98f7 (encrypted)
Stealth Address
0e6bae110c68377b893ea1ee0816104f8b87716c05996e683fc6cd6d637f6b37
Commitment
7a91d4ca92eb42c18f802400450f8abe7ed167f4ea2ca88e4a405ba171567179
Range Proof
672 bytes (Bulletproof)
Memo
8e278aa82056cbe1ab14c1e429f6f71bdf671e3948f4b597c74b529935f766f08bf050599079d8b95e3fdef506907f6466bf56d013536a41d1598f62fa57a4878159a312bcd4c9ecdda480778b5859f1f45226b92c82005e2ba41ab40bf62896ad2f5502b13df66441672abdb421febbeafe9b181b6c8c21d8eb5c0b17a1f114 (encrypted)