# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
821eea988ae65b8bb8dff68a53eff56c24e045f29d04205d15888793729b3d76
Pseudo Output
e2f1c1f5c689a2908ff57d6e416b29844c3fb801b6cadb12cd39698a9be4a178
Key Image
bc7afe091125ad32991cdd012d90eaa115bb214162b72378faf09025bb924b27
Pseudo Output
12703af405e0c5e4bc2a286188a570276788cb8caf1a89af5816a04c1783917d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
42455229c5ff50f6c2aa6bbd4a5ce16790a8d17c8c291f52d29f46345adb8c3e
Commitment
9c01857b6857f92feeaf62f563a175ce07912664bfe2573c7288885c4f9a8377
Range Proof
672 bytes (Bulletproof)
Memo
9737db618e26e7f415a9fb8f355fe1f814b06b9562b3abca5c8e784259ca7b42ee9a7d9971b918175d9f30d7987d0f7bc17380677fc0a392e8f0967bf101376bd364cd63961407b27e0daaa27f997cbbd30e390b3c714b537eda5ffa3f261537b9cced20aad6f03a506d175cf4e8fbe244c777e427c8862a7355f65574c24e55 (encrypted)
Stealth Address
2893f2a7ac0b6f5c0600917e5b7c5145b3d9bb8759ff28d5db06bf34ab378f1f
Commitment
f02ca9fa83b99f187078cba421e09678e1e32afeb3d19f770a20f413dd4cf64f
Range Proof
672 bytes (Bulletproof)
Memo
e296b774fca1a3d9fd3c3b27bf1e9db84e93a4b849af2cca57b09476044d1bcf67f8dadaee1a49c7921ab1af33423025050a49f8e1f1b4edb1fd5e77cc2a40f3077ea0fa9ea2dc242c4342d1a07f159452a4c92532ca1db4531c310159c95c19cd13b5fe03dc14c4aeba396008c7a1787fa4a6827e68a5ae987d37697a2473a2 (encrypted)