# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
56ea3018cf81b96d207bebfe23a0b0eacbe9f06ea9095ae31b7893a9d025441e
Pseudo Output
248e22d9a74755f1164e3efb65c55d8997bdbe316a60b71c4e02e799951f755f
Key Image
0c85d2eb16aaafe8d7f9e22521eb7faa74248dc3e2b8ecc98a0307d83fb4566e
Pseudo Output
ec46e76c0e1e0203364d978853c7ab905e223f5206876f13cca70986602e7f3b
Key Image
4a242f4e74fb294972ad3c6ef9ce00fad36449be3019d83a7667c80c6996455c
Pseudo Output
82ba381905b4ceddbbf0c7dad5cd3d9006e489c5a486970e7bd7a9dc257a754b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fee5afe80d19f29f0f6603c162778aa022d499212ef9b29ee9d5a2d91df51671
Commitment
1cf037f0933914f30d87cab66b91cc1e46aa97f29b539c66d6902570a7d7807b
Range Proof
672 bytes (Bulletproof)
Memo
90013a03effdc80051184c4e01a0858cb4dae9a3b502d87110db11c725d8ea545001a4768338de6d172d5c5cc60569338607c4043fd0839f0c23f75deeb422bc0aa82dffc8ee94119356cfa38b8366f528f3aa12a4a6f4071bcb024d335259a0a4c4a74cfcd0a35622fc943ea74fd737f30a114f5539d8083ac412a526f060ae (encrypted)
Stealth Address
0edca04275ef2d8cdf698a1cd33e3ecd91a920acd518f345e78212fad8679b68
Commitment
4e66b0a36e21dd60e7c64aef799ab0e1fddbaa645fe8bfa0b289a8a7e4d7a963
Range Proof
672 bytes (Bulletproof)
Memo
e8aa0aa1822c750670c3be719215788f478bee584c7a8662911007bced9605d1c8b8fe4a073d77bf73121d188499d162ce98dd114b9acde08a2cbd7ba4d876744388ae1181f0528a1cbd33ddeae46ef0808294c689032dd6f5a3037df28c45e6e9dcdd931288f52ad919bd82e263a52e4872c88fa8b45084db5da50782fb0410 (encrypted)