# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
04be6abe9590253e945869a7e2354b40d26e89e82f78ac612a31a7d262aef32f
Pseudo Output
80c25b5b99980458f10cedcf2875acd6c4bd1f1d79859dae541143e76f002376
Key Image
18cfec1745e1b6cb670eb646dc8f6d27bb9bc51813ad404c4bb689a109b3ad06
Pseudo Output
6c56439f7b98fb1865a135a6cc65d34de62b4f6f0fbb8f09f97f60986ed8c400
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
74c0aa282cf9ea359158fa36cea030cae2ffb73a6258e71649978be5391a7c0d
Commitment
6615b76410906e05d6580b0ca3377454eb7006bfee08fd99bde4ef951b289d3d
Range Proof
672 bytes (Bulletproof)
Memo
178f17e422d913cd8562b7d89856c2f04719906ab91acdb6f99826ad04da350f1fac33bf8b54f8e085e6f135b437148b20d5febef3089a06db30f4b887caa34820f596f545be492ffd0272aa7943d43ebee7994ae25480cf582d94bf0b200c86d4b6b4f613f66cadcb7ae4dba2a31646398ae5c86c3f481a0326ea0f24dc79ee (encrypted)
Stealth Address
a62d33de7039d65b3cec35ed5ad2d04105a188bbd398a2d7e9bac86fc86c6a5f
Commitment
0a15b015c841204d073b5eb083109503a2bcc935cd02bd4b4ea5ce65f46ba702
Range Proof
672 bytes (Bulletproof)
Memo
2e012417e90b972b01d88c951e073ea803617a028c6cb855778a5432356be4919ac76f093afa6f2d3c93728a1fa80e4a697d5d0b2c073fcab0753cbb0f173a41cd3b6011720e6bfc7e7022bb31e693ae1691caaafa6fe6abe8f6d69d7636c8855ef492b6c83c95287973117be90190ce970eec49dee58437fb79c0682bd77642 (encrypted)