# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
feda776ca592f22d1c3d2284b1257f5fa8d58234344f0c1a620c901ae7120c77
Pseudo Output
42bbfdcb2fe2eea551b5acf0fd5ebc65dc22b3cc47448c50a02dce517e0dda49
Key Image
842d37b2cb32dcd441f6d5177afc542826f14c19ce81d484835ecf79d2072840
Pseudo Output
d658b71df3d39292d06eb7fec2c6c4a081a6c3dad60c442bcd77107262a3e25e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e28d3b9599b37c7b0268b9ddb0e1cc4b4dbdf27113e68bb7535a64827149ce76
Commitment
56ddc6a9ef6cf7bb01a85f28db13fd0b2632ed1db37ccd5a3dfcafb51d679a15
Range Proof
672 bytes (Bulletproof)
Memo
669cae1b7c741d69ca228db261d8ffd2c8f4fea54fcfd8cdb1e118427cd0c316999a9a86ec7038908696e803f38a847877d689f316db3cd435ce1976bb5cdc8320b8316b8e4a086c377c0d6f750cc069abdce2ab6c539e2b8b5c25c8f7e86d68c9cf8944127ebf85f89057e4c6d352426d3a774756e428ff8dd95bd7f5ca2b21 (encrypted)
Stealth Address
2a1db58996c200d10d3bed7df188450b79f4a36efcbe09737c322b5a9f35e342
Commitment
be97a48b4672848b6950fb5ae50dd4a6677a1c076887aca723f7577c36a2fd2e
Range Proof
672 bytes (Bulletproof)
Memo
eac1b803f37150ea929f71901988b1c7b0030330d03ff62a26240e8aae46ef8f191f70eb43fe839cbf9b5d9a8b384464af164397e7405c72b207d29859c4d164c414506757aec88a995de1f724f4a0b08aefd0d2ceffc2e6c052b70d36fed037147de3ba4adcd305af2ef41f70926ca7b9286b68be1ce5dcd40d95a0002f459d (encrypted)