# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7842aa2b250be98c31f851b153a8c3f6daa1d0c1338e51f5a4dead9bf465150b
Pseudo Output
fa2ed2e4c3b04c307120deab37c0bcffd47615f35ad2e16dd5faae468accea78
Key Image
cc7034f3809b900f73c8cce7c5471d0989eee3130425e748ea7562ca08f65323
Pseudo Output
5ae75a538283f73879ab17af67778b88dea9978bc101d0ad7faf6875b48ed37f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
324e60121948cfce8a8e4b09a9417836b6c5e6200661ae2245625113b29da547
Commitment
dc81871d6d2f58934df5c03810f2334b3e7d064573b1638041d6eddaaeb0ba53
Range Proof
672 bytes (Bulletproof)
Memo
6994c8103791a4d3c72a3a142866fa3885216780f2da91c21ae723aa88b5f274aa546c1193480c714f1cfe1fb0ce3cb995555d771c89b71b1f2c6e8a09b06e7043bcb987c2ab8d144fa88abceb0626b02db35e8cb148fca2cbf220e1bf71ffa79cd8e50b64021ae9926ee302638e9eaf5002e66347b3120bd19903257ad92004 (encrypted)
Stealth Address
669c802f09be8b27f7b5745e6c77682f89388bb1980ec592e70392ceeda9ea6c
Commitment
6a7c52c8ecc3f3df4e421297dd40043d012fc962ba0089356d0da1e051651346
Range Proof
672 bytes (Bulletproof)
Memo
ea8c2b3700f6c10858ca56d6b209ed467d4fa465aea30283f97189a04cf3b6943891880ba1d1cb95ed17ea4b65e89bce488a0ba000ef2fb1c9362647f2e284c6a562d95f19ef11856e7f080c308188737c3cae4662e9ec717977f2dedfab714dc4eae83464cee595c6e69f77d13a6a39b14ac714bf36867f4bf8d830cb294c9b (encrypted)