# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
607bfecde42887c0b6d5620fc2d31a52f1a1d07e9019e4bade15047f0295f160
Pseudo Output
d0bc3f2f40357b2c54e8dc3c556907ac8880917c6363d6fba879f364ff2c202c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
78e36730428d07704c26d5a50335ea2849328df1ef56f42495151175313b8152
Commitment
945d220f57beaef862e26df85f54f4045788cfe7bb181af3090ebb9c8f8a7077
Range Proof
672 bytes (Bulletproof)
Memo
c05aa689effc0285f10da1d1e475104514026437453a819e6421f3d27c4c48534695d4e84ee89cffa47f2d222cba937aaeb972a36e21d58f3d6414851352d47eaebe9425b85e4298b0a65725acc7bbb282e7b249f8bee7f61f64457a92cfaf6ee4e01ab30b326198d347aee7bf0f7f342cb3902450b6ae698af0db692e7d0b84 (encrypted)
Stealth Address
407e2e0dfcf2fd5b0abdca7addcd1e46f085b98f6b5e456365bcdd10fe138479
Commitment
b2f7c080f56d175a0b6f3d614e79dee1c8f2fe83e875eab47babfc9270b42600
Range Proof
672 bytes (Bulletproof)
Memo
ac128c55d4965e19ad96cf9a5063e67891dd6d6dacb0a28c127e003e5579bc87dac412c1e025c93407c7d0e42bfbd455e555f6fb9ad67e1d6fb0f1b8e9f25003bc1e30ea933c6b025f539d60962411164cc049224761d45a8966960ee0a679616d7f3643bef94091dd041feeb95af79b1b6ec1800b94bc8211d74987388d27a8 (encrypted)
Stealth Address
308d8879c65a1e3692c326dddc23cb115aeabc3e6ce96adbb66094ea1056aa0d
Commitment
6461f2f61d8b1b9939d7f592f1389e4a73d19c01da50b91c9841acf6e420d015
Range Proof
672 bytes (Bulletproof)
Memo
3f08a3e798501c289a429ace317417edb3d9c1366d1213c445e56bc7a461aa94e1179db69ae721732e86d2335d69300123e469800bae6d9d4e969af9d5ca71df4d56f0f5f5a549a492cbc0eeac4c46c54cfcb1b228144aad632773593c52760f6e4ee6ac640c3ebca7bc220156f700ba81d8053073fa66781fe8a985569e54e3 (encrypted)