# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
cef40cc29530ccb16ad431c378c36a861b48a5505c5e2530ef582c0458bd3853
Pseudo Output
3a8b2a3bdcd48ce603f53e863e6c94c285e081bcb8165b16f5adaef8a0c37a39
Key Image
b22727e9d58a3d4726766860dd95292c19033d9ff170894c16a0316dedc9ee53
Pseudo Output
fceb0a8a122d7b472c679bd3c510e9b8476cdd1d902c309c8026829e3207357a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5ad26b18108a5e7af1ba4af34a8d246478fca3cd2ae69b8724f1589d2469dc36
Commitment
6828c54dfab60b7c001d95312c5edea5992f60cbf8a0923f4290c5c1c1c0cf33
Range Proof
672 bytes (Bulletproof)
Memo
d125bea552aa6709d479700f6bbf8113bf03726fec061f3fd3ec54ba2a6d9494dae7ec3269b3423031fff0ca53dd76876b89f345c8ae1e680b44f1eb7c772db745e4cfb3566a9ad26cddb2b50c2a8d59dd0dcebb69eb3363f3cd4aa6a07aad08e39becd9544b8cfddb8e269ce7170871b3f7f0d08cf17aac37427dc36c8cb840 (encrypted)
Stealth Address
1e4f03c9eca45059e807ba1a6e4a5da3f13038159d67303fe924ecea5d694251
Commitment
ca3f1dbd9e2f2f6f1602f6fcbada709270c2755c4cdb5f9d9444ca82f1a97b79
Range Proof
672 bytes (Bulletproof)
Memo
46ae101ae068188c64486551080e232fe0a3609029bdc4d777a99696080a7b473fc267a20278ed63287e3e655f506fbc14de2a8a4c17dc48408febf85c4fe8b2dae055d52bd11d3c0d82db6d4c70420d57f55d7dbde3d5486f62c03ce8c64b127179354b29fbb6a9832dc04aa8df5a7e44e909100f7ed691bf6c7cefd3ef1c98 (encrypted)
Stealth Address
ce436b2c1bd6a44319ccf9f60e036e6450a2250e420e2fe1831172ba0db40875
Commitment
5818aab908e982f607f160c4136fa463511d64ea5295eb7e9030bfbf71d7c61b
Range Proof
672 bytes (Bulletproof)
Memo
fbc119dda61ef46a5f8615ed66bba5c2235a0a2c856ae6876fcfa5fd90a7a4fcb99be6fad80654c0d98fa1fe80eb5f5e6b36cb6a83e26ff7471b17c059bbfb3781be3a9a449ce8e12f7a840fba98dcfb38a5a8d9d0175a320b51fb49a3d9189d383cd57161a7a71b5944a81187f5bf84d3482bbb1be5261d85993db5109d7004 (encrypted)