# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7a42fdfb8a16850fb94b0db2eb44e07996e185fcd74e1a7f794b9629b387a13d
Pseudo Output
c265694e85fc8c342417211dcd9a485db003955de1b209a09a7d7e8a5b9bfb05
Key Image
c0bb1dcc9e3298934cf05faa88f111296975b8feb0ba82f9bca1a0751982be50
Pseudo Output
229b3ad780f3cf9dd78140089c0cc7328dbefd8dfda5511e8f6c329b0733bd42
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3ea3af4147fddc03d524ccabacfa158ed00f14d646aefa97f99600a3e9662660
Commitment
dee2624b8fa5a5fc6c191be2506efa339f6b9137f340036b99734c3a5ed95703
Range Proof
672 bytes (Bulletproof)
Memo
aac5beab540037c6ac7d1b98c1f2a94bcb0cb1571904c01a0e47d875b8f46361fae0bba04d1951796b4d77680b1441fcc06a5b4b65fd431c7b7d18cae657110b10c01a849980797940e57649471575906dc1571cf4618539e99558f2bb3e378b825909b837d709508234ff827a9f8b0ba5d97b37d0436bd78360a09dd823ea8c (encrypted)
Stealth Address
30dc5987cb03f1ae6d48310e9f2dfe348ab86fe8d07b66e2a556ed0eb521dc41
Commitment
c6d2594edc41cc9c4d1706afe80736f0cab52c5ff6657ec697143b0430ce756a
Range Proof
672 bytes (Bulletproof)
Memo
f69378a8cecfc55229b1a7f1f620ddbc051b7c7c283220d3def834db7dc4c19beafc085f677bff1024668f19627a52216379fad2025a48d284fa84e7f651ebd66c75bb0f5e4e6494c22b14f5c8425f7295d31e2c1bde899ee94acbd104e724ec6a4b52ab62b81f5e1848521b9c02921670043e1a51f65032028180eabf9dc2fc (encrypted)