# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
74242017e98cc66819a1f07c37093385dadbf8bfbaa939c54ac42621237d8f1b
Pseudo Output
4cc7180441a0c0eb7341c1cec6121c07683cec914514a1ce5c95ea787441e11a
Key Image
e22ecc4feef363289d4b707cec0f0f06d9f8335902ec9022b621f40f80b6494d
Pseudo Output
907a0feeff3a5b143c856332b11e5d1f7a5b212535f4966d3d40a7eab58e2f1c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5c5cf7444294bf7f2fa8de86a7d3f713adcc0cfe6bb71d77f4b836c7079e965b
Commitment
2e2b8b03010bcd1d8e1f84366655e2a6a23c3a482d71c7870b1804128dae765c
Range Proof
672 bytes (Bulletproof)
Memo
ab911af0e16ac222fbd58511505258a190790916d3f3c8124105b82a6e962a630627517eb5e6b2f81525a6b9d9bdf8a06583afbe4cb119e16226d217bfc3aa978fda5bdbc9fe4cb8d34a99d7b4735b83a7f38ebe9718489d1fc7b05012173ef832703f2af9e6ac33e96d5ab832688491c933278df8fe34193d1015e0fc44e1e5 (encrypted)
Stealth Address
74d413754e77ab80ca058377437ba2c6307186ee2efb996e5169da29bdc12801
Commitment
4a522f33ecb3213a32823f20bb59430fa053153b1e60c1f693c37e0a41892876
Range Proof
672 bytes (Bulletproof)
Memo
05422e4b21ea0dcf4395bbb2ba851ab29950a32cb63e9a20ab8f0c30815fb5e808c254234307cc52e627b111185c063892eedb598e81d6aa7a2f5cbd00241343b7d82431ce2c7dbc89750aad17a2eb9473c7a1734fe3d462a773abb087453807cda168d977fff0d43faeadbde2ece82c7d9290c464e02c7ef0434ee28915fb6e (encrypted)