# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d0a7cd6d7571861097f2b319a7f3ae40b65f7471fdd6eef2a2b00e242f58524e
Pseudo Output
02ae6ccc12e88d811d8d5e681518d0072873a3c2bab38a079ff9c601c56e8b43
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
78a81c1ca12c4b293ba36fd28c6b5e183c6fedac138d991995f48371a0cd902f
Commitment
6237d7b1013b87b9ae82eb9efee997c747a1c75389dfba10c6e0247da9135f3c
Range Proof
672 bytes (Bulletproof)
Memo
c1f172a6abb4a81f636e0f56046624610cb319e722b036c477db95cc83616328f422ff5774155aaf2e6541eaddc38d2149f591acb0d4567b00bd78525cf11f63bbe70738dc786df058809ef580391f2c1790758bc78a189cff00acc32f593cbad3ebbf1e03e28d42d56535eac69f8a12a9f9a5ab67af5e03eb4bc132188526f2 (encrypted)
Stealth Address
6e35df474282626d9842d1034b39d4f3c28dc77009bca3b83471023ad13e4e7d
Commitment
80615ec6d547a16af9c7d3f641427c4b7709fcbdfbea5f81d2a23372d5d73856
Range Proof
672 bytes (Bulletproof)
Memo
42f6feb0741bf2524a4edd728fcad2ca04c1f8861355aef893b156f94e82d15e2f6e56ed6772b28636f085cb8b3fbd98d8f9d8c429d6755960ecac6f64b80c43c2ec4293b4cafe4fc1ce770b1e9761f899441e68c3e6d9860acb6850c05f40441e6f75fa49daccab926e5448ba3ae316fb78a2a850c6170a6b9661f42e387e5e (encrypted)
Stealth Address
22756c2182c8be675424591609f93807b0641a3cb3da90b84220d1f8b3bdac53
Commitment
443e93267fd7ce95d1137cc2554cbc596b05248cc92976597c79422f208cc803
Range Proof
672 bytes (Bulletproof)
Memo
7c25831073c2ea512691a7150b32f6b0ae34806760f7f410bc7b55bb8e7ca5923eab4216a7401bd7050f6ac77c4cc7ad016b3b6584b5e1a2ad5552f6407137dbf9433f54bd97d50018cf86da08b0b93d7b629491199cb13ca861a64b34248df4d198f25eb05ff0043126c00fbc6cce964629d74be0c942e4fc7601333c5c5ce7 (encrypted)