# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fc7b498085ab0bbcfbd8b278a316ab33f333208939b73bdf2161bbd387a49f4e
Pseudo Output
56a626ce07f09a1a31065db3fb9a858a3607415fd21ff183278bfb5ab508b93d
Key Image
ea661301a69c4f4eca3a8d941d0db06127b0ec2e6c6469f9e968e0980269990c
Pseudo Output
2254ca168c6e0bc8f386b3f38bf6d260a88efabc85e1bdf0fcdb298e9d639203
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
cac4c267c046a36fcdf5582187558ec25f59eae986c4c594c52874e02c2b6915
Commitment
4404c6f3d08fc13e0a6361a3688b08009624e5360e73fdf67e0633ca8167636b
Range Proof
672 bytes (Bulletproof)
Memo
f0555183092c539398975c90def828e98eeb157d163b1c7e81abc88395c137212f9ab1576918642f8ee9cbe680f56b87d9c35a05271fd4367f7ee733b99008720c245ca7c3a1ec158974337c6630457740c7135b7f32243ae61a6beb66e5fc8fba8354bd35732dde00bde2f1a03813036b01a52fa03ae30459536ac09aca9db1 (encrypted)
Stealth Address
0cfeaa6f99cd0be364694e0950b5582cb3f47a7035ee9333865d775903976777
Commitment
9444c20a7d64ff1351f39b215e587cecad0a8639f58f48bb89e8545b44172322
Range Proof
672 bytes (Bulletproof)
Memo
04ad0d79168d6a44c89f0e80cae22e3d68a9a983053a63d3df7e8de99480854acb5c9efa19937e5655b61fe24174b8237568a6c0620f9cadd7764a2963b644e52f735f8812810ff422201ca263a72114a94643c31b0a2c6b6fd18ee94d351944dc0beb1762f6e956fb939943dd706ee3029e74106f24aa6d3407e00303ff90e4 (encrypted)