# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f2b85cd18db807db69af9e746ec4ebc86552ca53e74dee86190f019baec37d38
Pseudo Output
48c483746f107e7900c9f13ed52422a7569431b7adff741c475668a3a524a042
Key Image
6819bc5b3f7e074a117970e417b49d557a5b78f8bcb1771abe8d2b1357d9eb07
Pseudo Output
4480251ae2526660a2eb3aa755356187f9a1fd4aa1259015b77151b747f0c904
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3433ad279fa2e21616df62b3bf121950f9dc11b48722c9e0cceba1e9eaeff92f
Commitment
82d2a8bfe113cccab23ffce974e1584d8c9c942e5f5416c42f9adbac07287923
Range Proof
672 bytes (Bulletproof)
Memo
2507e04a0ac670e8941583a011b04e2e25d8525ebc19d0beadd7949a50b5de26abfe68342c8c2a00c0487f8de18cd3302f790ff1120f72b5e1b52c558a6aeba3e07e1ee2b8e8e684f3da3bcaaa8efdb1f42cd8f88bed78a9ad56469e4e4cb2c5e2415fe62585d1d2e2d7914f6da0166cefadfb457e8186d73a0dfa304d9cfa29 (encrypted)
Stealth Address
02a9353f4fd10c390f074d2107047aaba190fd82514e51bf3499826e0271dc22
Commitment
c8dea427e4acb40bd449ce31b65c38a2d5b7d75c44c655b1dbc242f4ec85ca1c
Range Proof
672 bytes (Bulletproof)
Memo
5c1bba0a7c792aaec52c3ee8cc3c29a518ba6bfba61888c4258e2e02dae513711bfcacae58abdbdc2b166cddc38717a59accfd1beb4dfcde748238aae3c4d0cfcfdc763a4035587043936f8c49a8359aeadccf2f422c1db3162542cdc00e30771e12ae61b1dbfae65c719398790ebf5fe26fa4b4f1a8336eea9ecc7ce6337490 (encrypted)