# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9200485a63557c88028feb648730c6538763ec1ab77d9a0e8384acb011243e50
Pseudo Output
8e3bd41adaa56b06ac3f89ed07729a098c799c72874094319a8b3ddd57300f13
Key Image
780f07089b9849fcd691692c8b770ef01d6ab5dc5744b79707f1852fb1a60d21
Pseudo Output
f860c3561798ca7d396d1f6d7d106f4400da72b26b77d6f6564f0bd0def42b57
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
72da7373b6102ebe79010417ef4064d98ef84d8b882725f2010eb588b8cdd350
Commitment
e8f3228725d388e3b9e165a1032366a29a2c58275d6b93f3d44d3c9820d84b31
Range Proof
672 bytes (Bulletproof)
Memo
dffdc9f254f14cc39af0a207b80a616105209beb374063f3b077de94fd3db2b40134817a8cf3c4f22b26ee9153e219e65d4d765c6f59776c2e658e24b6be54c99f71fa9105f3fc7531dfb81198018e25ee26153b534d2cab8e7c08a17a2a1f8f2bb9855aff31cf806d1aaac9297cd62690071a9b0c5a86156c7e27f165823eec (encrypted)
Stealth Address
5c3371f64283ed4c258fa7a0bc85eccd224bf424aeeb820b48d3f7d54ca25d32
Commitment
8ed19c84db56532706c75437cddc1396352b045589ad6cf7244860fb039e1b0b
Range Proof
672 bytes (Bulletproof)
Memo
70fd0238b16bd2e417a792ea0f637647ba040196cdbafc4f8cc9dea63aa65d43e12b96fe786280e4a8771dd6d8cc7661b7f62fd0939478eed2bbe55160e7d94e8d6ade624ff27b557962f10f889ee53d15df39b9a5ed2e13e0d1ed6e7923d5468fb29041990b7cacfa55697b017397f094b46c7af4764a7f1c101fb4389b7665 (encrypted)