# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ac1a6f50213c61b48fe5357e4fcd396c4ed4eeea22ba0d8008ab4914d79c590b
Pseudo Output
daf1421523ea964fa54f78a7109549c1817ae4641be283feb3255859c5af4d13
Key Image
2a98bc85538687fe2bdf0d22b48608a9986a2922cc501f581a24efc79edb1979
Pseudo Output
c26a61c6920a613788d6ae08507c01a8205f78ba92419cd9e3b2b5dc1e7e174a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
66b2cfa98e12b73e7fd159798a14669bd57e5e86f0c242b55369b7b8b5a81c46
Commitment
7af00b95fda7002ce6f42bf8d5683e4da0e1fb276979167fe613eeea01c53435
Range Proof
672 bytes (Bulletproof)
Memo
ff7502f9ad3905d8d5a8b1c817c6cc164c7118f93ca303a6ad9b3d82e67e57b58d35debfcf1373f7f83299f18cec242b0230b52723168204f20def50190aa0a246f1e417594fd5d074fec6390db9ce78c41f8e30efdcc04fd40cd5ccd933eeb3e2d1a3f1320d7810483f157855ba1dd918ab3b94420bb05dcf8dce66f40e8fe5 (encrypted)
Stealth Address
6601189b533b8fa2c54f410ac9e4eab646d1742f07fc2470ac66629a4d985b45
Commitment
4c637af48f6f301337e89847076f79860aa5e1285e78f4b0f36ec22424b27a73
Range Proof
672 bytes (Bulletproof)
Memo
185c385b9dec76a8a961874f1ff6effff9736b3d2c0e9553a6d2af41d4e3c945c23aa34d15708f044ecb2cc32191ed430ab28d41df9a17368ed5b20492a32338a650c0612cfc082e22d1d061de4417df286655783fa1baede6c11dca7f5e227cb18bf4239e091ef2e9afdba3fe9b04b3ea1bdcad834b2f05936cef611d99c07c (encrypted)
Stealth Address
f8f8e2764839bbd6525c57595febc4f071df37ae568520c222a3e2a615b0767e
Commitment
60329e684561a241179af7679036a06f645cbf7115dc6bc303503b68cb040a2f
Range Proof
672 bytes (Bulletproof)
Memo
8fb08d8f090ca169b5d6a8eaa9d8992bb39ea93159bb6aed8a09ed2a7f36d88e20fdd146adfdbddecd5676ebde3cb5cc442b0a2c04b2a0dc9e0e6b28129e9e443f40080097f2e12dfcd7a314ed1e06534529bb99fc7fa0f7960b892fd37b4d40bf22e469fb0abbc1c8cb48296940014492990ec350c1ea152016b01c0e746380 (encrypted)