# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aa0d9d578718e3f946653fc772d1048766f2b0ba40395446aa33bc55045af33a
Pseudo Output
26424ffb0f9c62976f91a4daee70b7b62180df137dca755aa31c3673aa186069
Key Image
505f3a11a57fe8de4285a6d07a958b4c8e2822e5bd4441fb1b6f109395e11b7e
Pseudo Output
1627d4e73e610cf00b797ca9ad19b21021fbebc637dd484050f7f88206bc3166
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2eaf587e8a7b83cfd4eae9821931784078e7f11fcef639cedee3b476217da26f
Commitment
d6fd73492d0d966cb5da07f7c4ba3578499a4de3c0e2dfae8298f6641d4be670
Range Proof
672 bytes (Bulletproof)
Memo
fd60916860a3ebe86d0fea397553ef9b6beb57cb9dad1da43cb25115b13b0ac18840a6279402284eff80fd76369705b1e2019cba9ffa666edff4c7c692110404abd4da6e85b046b1ad5457f76d2d1060731700dec629e41cf678263ccaaebdd8d2245a6138a7b5a553d2633c0fa150ed295f3af74f7bafece0697ab348186d51 (encrypted)
Stealth Address
de8e219776908b005370956cd8e23c4282bd75163a1c08e830f762f3a7abcb48
Commitment
941e1a9ef2a9beaf9b9916ec5a6b9837bdd8c7dab724d2e7086677177db2251f
Range Proof
672 bytes (Bulletproof)
Memo
39b2c870ee838d36577ab93f3fcbafc2da4048fbe9d5146e12e332aac6d72068d27eb9446bbdb04a4f481df349af7e9f4e6f0da268c8beda45802062cb44abf61362ccedf2652fd87f5b4af12ede2713b6c06a8382ae9360273ff8156b96a5c0c6ba0c19a3c5d154d59ee346a60f592ee49b2e277808a13adb3ad2fe43ca2beb (encrypted)