# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
904807de5a4b3aebe6c000feb065588d898db74b8420f2f59a0415502c27b057
Pseudo Output
a25564807b4cb20c72a900899a49f270f243d75de7d8e42115fe32ddf25f0715
Key Image
2e6c752f286603730629f501a314886668143fdd6883afcd7d8ec9124a743a11
Pseudo Output
a0a68357834c5fe89b5af313a0ea61a9f53f8038ab1563f866a39aeb9bd59a04
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
76b6a025071b9de7c7883d7f6b48ba0a0b5ebd991eee6da1060001b4498c3d0d
Commitment
846c2fdbbc8e99cb3436884aa9bbbf4334504d3cf02358005ddab58c3747b91a
Range Proof
672 bytes (Bulletproof)
Memo
234f3097aa04b272c8c036eed07f3dfdbdffc8f0d140aab1ace2186f34b0d26fce68c541f77a771c497462f2ce7c840b7df125f866b1954b24c5b885ad15bea432b3e245c8986a3e8aa863977b381adf0ac46e9a9e5c6e5428a590d9fac09b62440da84057a83ca3f2dda0ca5c6ec7694e25a821b8df91bdc086a3955ead762a (encrypted)
Stealth Address
5034dd8801ba1ef82204ab9bb801ea70a27dafc92dcf548df65faeaba49ab850
Commitment
d80d08ce7bfc0c40fbd73f9544861de3951302db72df69da3cc1f00de23fe77e
Range Proof
672 bytes (Bulletproof)
Memo
d657f68a4bdecbf6ac09a2b200c1bace15f4520893842b14c73b204f0c2ce53c2b93430dc17b3027a8219f04d6484cbf6c985a5343fca3d66bfc6b280f4eebb21b8afe8abb483a61c7b000ed94c89141e98db385c92bc476f8341dc48d1e6dc135e0a056af078b664005ad582f942bddb983a9e064072988be36719003e0e977 (encrypted)