# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9826fc34f9b680d8bb4efc832cd6a43f2861e2322563301105f3b2ad8861bd0b
Pseudo Output
88dfc07645018a5a2a0e3e812b7b32a2e104369a1d00c3b66129de99d8c59768
Key Image
4e6f8efebf3b284a5dc2704185ebfed303d49e3cabe7d5e34f85c07702746d7f
Pseudo Output
5a26e4ca33d42cf6b28ffad19dfd9cbc209ef1bab3841b47a71638625faee327
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f221de8207ca4bac3512e62ae178501f49cb7a640add840e9163664d7de66656
Commitment
ead7f6cdbf50958e7fc1a7bf13f8088f937d2d8de96aa05e606d74a2f70e8444
Range Proof
672 bytes (Bulletproof)
Memo
682993bc39ab5a76b949d08694269eb1987a695317cc9cb1bd58b4fd6bf5232e650ec556799e24ff4e517317325485902e45f959f58b6ffc4ac11b0e775f5bbc4bdc110733c9bb5717fc8113e39ab22b0f9a478d66ae68aeb4f1c6fb3714e7c0deb1183499d00cbc3937254eaed42b4cadd9187c78b8cf16f61eff3595696f28 (encrypted)
Stealth Address
948793b5353ca928a94d5874d967849bc35c0c95c74e2dfe63e15c7bcc34eb57
Commitment
08776b92241e341d40e2ad31ae5d5be6d1a26d4a617a08d2fb41ff4c40d9765a
Range Proof
672 bytes (Bulletproof)
Memo
da3258f694f30894ec9c7bbb424aeb0578e25c6ee522ead3cc7f7c723b195a2ada02f95c0e820b739937add5e48cf67ec990ab5e972307f1943da59c6c5030c32e7555c3c4bf2c39aa3c1f5f3bb98fc43473f2180ad804c6434e96644160ad01c5b47593ef615213b5f6b4170609482358bddb4f2cbfa0bd7aa1054a4579120d (encrypted)