# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f0435a4640a669b747b987d606b522cbc603730ed26d856029058e486945000b
Pseudo Output
80c2846c9310fb28b75b5d044814068be3f7c8ecb6f44ff11bf72246f9c52c60
Key Image
8881883201725483d72d3d42b307fa8f597900334c14848ed94caafc1b1c9b53
Pseudo Output
380ec4ced787f4800a0f21b422c95480ebb7412a437ba301434cfc7414f1a13b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
668c3f8437290db42ab150f62dd2c20034d46944f5f6c51e8d7204be74e5e34a
Commitment
9e12cc781239c66422fc1272ef68cdc1b4b25bc40e2d6658499dd2d7db801d73
Range Proof
672 bytes (Bulletproof)
Memo
083b16bbd163a0f2fe8e6556bb017581dd2375ce38b633de2e9257973932ca2b524680300e70bc0d1d41281d5415df4ebdca9c8dcfd0e01dc2ab67be8ed0a984d469312ba84a7a1520e0f0f6bf18de8bb5430a9da22041f65f0a5200b90bb6d3dda35aa5c3fcfc3687fee32447d73b72563d8d341dbecc6448791a838c9619d3 (encrypted)
Stealth Address
561ed17f4a48acd78a7f8fe5d1f709c7eddfa56b366289a1a980ddc08ae1b558
Commitment
ca0726f30f53ae5e6e92f508cabd02e7ebf643d49968ff479ddf381ca937302b
Range Proof
672 bytes (Bulletproof)
Memo
fa1d2e64510ff3703d40af3397c5d49ec0da70a1f5b4069d460f49e6fac1cc12edfde4c5a8aebd439626f4716f583901b1bad28f866bb399c8fd5d91d31f45e484b192d8b4749a11937257de12f4208141e93ad241beec9f6a7b24d1e244b69032ed938d9b1a072a9c8c088aefa97e00182ee806b6ea63d2b13585f7608875ee (encrypted)