# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e600168730fbe4536acdfa2236ec0d366b07fb3e188445732896d6b4a1a6de00
Pseudo Output
78cb88a1f9020f900b75c1ca490abe8f2d9aee2fc43e4ac37caaa2b01c485429
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7610a080f5ad337330a638fe1add5d2f73ef119302ba34fa2369a4a0cdce284a
Commitment
8469f04a38c3d6d98a49fe1b71d57ce4edb478f75021c949072e2085180b3b7b
Range Proof
672 bytes (Bulletproof)
Memo
bb46758261d7b9ff9c4cd28ef96c4d6ae5f063c2225de1461a923c2b3d5016be60f7cd857ef89f0c4befcaab2d9014acd54800f80ab563a9b7398b9f9a6d0faf49dd75a056815af0f204734a483ab982950fcd52afd8ba230cc046bc5f51aeca95aa588fd48231e142565ed2a47211464e782d49da88fe78f13355f60d654140 (encrypted)
Stealth Address
f2c610f74020237e7667964bb369a4fa3105389d4aaf6f4d360d7910ce175f77
Commitment
5ecba98eb722902402075225a1f88a144c1289f9f0b8b71f7c26a799d3857626
Range Proof
672 bytes (Bulletproof)
Memo
7713aadb459c39edd6f60ac2e7bc5c61414663ac4a2307e5e20d63ceb0cec0cc03b628f7bc6d1f05b5ac3ea14433a1d97278b698579a660f86f3f8b0256cfa198957bd1d626c8c4fcf20203591eed5978cbbcb002ce91eb9396f399b6c00cedf5bf70a4e9d5adb6c79a344a4aa972a05a61183ade6c8f3e80b7db8c2e7814b12 (encrypted)
Stealth Address
b8403e832a92e2a83aa8425c7113aec54031235b681e83c05fad86f927265c0a
Commitment
beee0f0258bc17f66b47f25893a067a0ffe0fb8275f4403f96e85541c4ec5250
Range Proof
672 bytes (Bulletproof)
Memo
d09af6f6f32eaa9c48410ffdcb0e9415835a344e400e8d3b1bd66c577fd28d9060905b52f02c246f21302d6c7f413f19a3905e85e099de341a90c1ae35455c75919a5ff41a792e5b781b0b0adb9d5a6ad5061ecad9648c69b093e4b0d2824a844a83812cb7f6e2b36fd5f6741670aa35844a1ec862c70197e688d11cc2056b9b (encrypted)