# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9e4f25a3218e33fda24a812da6bf9170e31a1af1b9df7f385d943fede660d954
Pseudo Output
60c486711f23f75afb3a4cdf91d3d168e6e019c71e8058787a3750e5e5874400
Key Image
7a29f716750905bdcb31f7d40e3b7baaeb7c1ed3b4ec14c3eae8b062dc7db90f
Pseudo Output
1af68bf7ebe229860cc9c7af2ced0499f4c4d081edfb7e394eda3650a9daaf3d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
90343f810acbb647342111dd6aa127ca49aeb76e8b02ae917223dd91187dd54e
Commitment
5a94f74bfcc5674980f5d8289064ba01fb19ffae96f3210c83356cfe5b156e50
Range Proof
672 bytes (Bulletproof)
Memo
9e3d1e9aeaa5f9d6ea6019299e1228d3ffa56ab5bcec1d8a1637d7e5be5cf38862dd5aae9c72cf5f078f02a7cceb58107472a6708bf7f060cf863338bcf933839b58ced336f18c103624bdf9a7eed13d3f7085ebaa73131036f23efb5d95620f8dd214aea0b870e7408399f0fa84bf6b5e042b42d5f9e1521ef3f8ab59f7fcdb (encrypted)
Stealth Address
aead7739ca675611eb06fcbfcababfbb3e0978569f0245bbc0700912d45aa401
Commitment
28636e071d3056d7aa9bc738183586a570991404707e52ba350e7341fff72d37
Range Proof
672 bytes (Bulletproof)
Memo
eb2410cafd2255bf1cf99a7a7ab9677dc99b7f231c38a05fde622591cf73a3bc2d2168ea0d73a2d6008e6de85043c159a212f0a9f812b84361a33984228f66d224eec3be8382532581f2a127e3f35f918695a2fc57bff006120431359fde80ab682a079ac5117110f78c70b0a08e20443148a72810c7467339ba317ff60940bd (encrypted)