# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e816ceea3ccecbb0cd2fb290e31238424665eefbf496a320e889b62414914c3b
Pseudo Output
2ab21e762ad40f3ee2a9c6e34dcc7323497865c6ddd009fa035948de5cd16c20
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
78468d4b49cf25548631f1c9f25900dfdf2b9ef73986dab2357ed66aa98e8151
Commitment
5ce889ac202ac50fef254c1db49869dcbeced7bff370eb66d30713e48fe1260a
Range Proof
672 bytes (Bulletproof)
Memo
06f15ef395a9ab029c038459a3720fe1d143554b62a6a320bc256c57ff864f1548ec08f516ab8ffb36815018ff8635f622b012b04cf444134b2479896fc3c94b9c7ead55de27ace7e22298832ab7518dedd6769864f90fd0ed26bda0875a6085a3c022b09811847ab7cef653a65d29b65fb46ce1434ec1a823f465a90ca8a833 (encrypted)
Stealth Address
d67ba46b84d90aa899def24325db8fd409f106eee2385382757df802d9e27257
Commitment
9260febd05736d018382b10559161f784dd6b4efe75ac2e2cb3fa6093bd78205
Range Proof
672 bytes (Bulletproof)
Memo
469ea8c6d51f311eebc5dc4eeb4c2176d565433ec28a1091966139042444be41902b63c1606acfc8e877e6eaf8408a93318e36dacd05de5c58e22f38f8c9a39ed8222701c6ccbd83bb52881803405ef1b0a2d65230f47d119d13087832be98c966f0acb44105f3d9bb0c68ed19c318fa3a2532bd22cfee413362a4c8722e2e21 (encrypted)
Stealth Address
60619a3dba71249cf14e4f26c12ccd6b14e5e06f0bee555b7b869e0a1325fe5c
Commitment
3e221d3969a6d2efd7e84113b4c3d35e627af83f32ab7bc42bb3071851556c22
Range Proof
672 bytes (Bulletproof)
Memo
f68ad381232d33964cdcb5c84425c53437c0d448ecda63517cce0d3f747231ddbb5e1f65a25cc650a2002c4834770f1fde13cd09fd4b7998fe03e89502dafbca72f27e3d0bd07e60d137538becfb66ec85a1d0337470690482fabc9b44afaaa9daf2d5efbb0767adfc8e936bd234a58f0a75d8ca9818f047bc2fa01c8bb2bf6d (encrypted)