# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
303a8f71f7e4b7bd905763608676f43d2a0b971bdbd7ab4ad54e3e59cfb32614
Pseudo Output
421f3b1b8bdbfd5d08ed3917ea88fe2d8ce56f3b48f42e2848963da655310765
Key Image
505539becda4a30f592b7a701d28e45fb903dc890f7277c969443747d2c77a03
Pseudo Output
c48e074fca4b011545f0b5edd4d97f56db2bfb9d61989f1b55fbdcb79e8afb27
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
484943e9569cd3762243efb36bc3d26513e028ffa2bddb35c276e64a7d17b53a
Commitment
82cda14d4b59d99649f5cacc0d26f79a6543d2e8ddae2961dcbbda6d26a4ca58
Range Proof
672 bytes (Bulletproof)
Memo
10d8e99da366f2fc14b9fb9d60dc342cf791b45b76a6442a1ca263c9e9a5301a43d348f15740fe9bd4d08803958e65c93d023a97afc2f7742bf4f0c39b3810e4685d9fa93f09ac090739970797a298a3b64745aa58609e096109cacf490a015a2bb926a421673f56377411751f1e0f643457ab6fec0c53a2faa6b1f7ebf3b09a (encrypted)
Stealth Address
54493c3213266661c5a0a23c985f250bc914a883ee79b36e83634601f426da74
Commitment
3a01660878a587173448036863484ae4de9a1641164085c9477297205f03a946
Range Proof
672 bytes (Bulletproof)
Memo
73d0e62e081e4b8bf7d8f114841d252252b896945bcf387bf717e8c864cbf19e6eb99c1ec707f19a0fdf3336295935856466c8dcffbe52ff7d60dc1e8374341c236b5cc1504e234bf85e49adb5b78aafc0b974f32062b8de6f56ee82a00bbffc49648a8db2d8ce227de804489a829b59fcac4f1699713f2bcc9d8f0b52ea3175 (encrypted)