# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
12f829f3c3fdc2f12d0fe09292b7ff22c44c123b93e659c276c180e619ed5d3c
Pseudo Output
64e80ba08ff9021f852c05eaac551c62373be3aee48f3737588e8bbf09ed6d13
Key Image
7c5f7f75a00470e0bb30d09492120e1c9bdeb205ecaa4cf6f0ea6f443d9c1e5a
Pseudo Output
56fc00ee7db268df4e3f39efc61f78eaf6b314174259d1020770964bd6cfd651
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
84373726d81c273e85a0e6c6a1704b94b1d9dea1c7a95cc043aeb3ba6875531d
Commitment
1efe51eac80c6472ee93f84becb85d57b774b9b7395299503edbac8b9637f06e
Range Proof
672 bytes (Bulletproof)
Memo
6182b627716046906ad6373effa9516772d046c1ea2fc5c0d5dac42d4f95ac14ff8e7d0e72887aaffda7f217cb052426c70351e0c43b097500a9b16ea7cafe5442dd5c319f8b8359efb0c08debd66d72dee2e381ed88ed97cc7dc71b485f86226b0698f6d7ce9e9870ad5707c8ca62acc575ee2956ad3d33ba110a7c709feea7 (encrypted)
Stealth Address
3e62ddf6cae366222c9a1486343fc71581f04f4bf25e6a4cb31562f1eb3d2c3d
Commitment
c6d83147a5f6248bf688a83bb8b560dbc2bba86a5d801c8282c47de7e096ee06
Range Proof
672 bytes (Bulletproof)
Memo
2a0fee5dfd8bc09077c71c76c0974a507eb639a77ebe23c69cff8425d01aeec26a1fa0b14194f954ea77586afac5fb19bfbdf754b4f9de8863682eaef4c76aefb357bb3a6bc5e25e19070d55d9629e1723e760bab76b47fa9aa0e6145b00e3311c1f0135de3dd25624da22239d1bb2c2029c1c39c1933237e8a933724e5457f5 (encrypted)