# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
78414414a7522fa0cfe1f321f683cfb4a87eade78e368b164c75d100dea96a53
Pseudo Output
ee0a92ce5f54d9594a47bd678431069e35c44e1c48a1006d6e754ee289b71460
Key Image
7a76a4113bb2b919dedc2d041d4019a023619fead29b2dce3551fd0dbfefcc69
Pseudo Output
ec128b2f50589d8e71a76e6049ac91794358f7fe4acb17a2af9b49c2d8010746
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fcef124ddf4f32f0ae71dd80c8ff7b30148745b5cf64b679f5a8e0b3f8f46268
Commitment
2809130758236a16502021a6ca51a12c673547843a86f114bc2c916e9e0f6766
Range Proof
672 bytes (Bulletproof)
Memo
940df9573eddf72ab59408c2c4eea9214327533b1dcaaa03366a1847c238eb32d5b0bb4b324ce355862934b1b06e554601c538696c195a999f6563048ccf64ca756909341218b85c8be28f18ca41b121752f5c913216f7242e98a721a9b9ba7c1fbdd7f81f27bb42c062b79d84bbcfcb94dd8de1da05070eb2a11fc13ed2b039 (encrypted)
Stealth Address
54d04956df9de1ea561d07c244040a0b965a311bcfa9b515a8f84897d9613941
Commitment
a4ae6146672a58e8d7e38086a54a9d872c7bee3ef6dc705ff3aee9cab8ff9d72
Range Proof
672 bytes (Bulletproof)
Memo
c06bd49e6effba54f67a0c153d74ba28ba441849889c35993ec257d64f3c9c198b84a809f23e72d4ab4b92ca385b352f4072b706e8b3c4d75f6989edc286cd351ed6029965d526406924b5b41c9c03481620370f20751b96152d614c840ef8e24e7ca7b3453e6502c3b72805daab6be737e254060f4f97a82b3f70a8fd92631b (encrypted)
Stealth Address
b85ca3c8a53ebffa4c2a373e21ddb11ebcfcc164a76dd0d406c1dbe633eadb7c
Commitment
e408830833c38c21b6f4ee09225d435e96bd62f5d9656a38793c9606ef01895d
Range Proof
672 bytes (Bulletproof)
Memo
e25b295960f03fd7219b08bf096e96f6b3fd07cca220c8b021b4317d3a526a44bfa3fe287b3656b831f2619c36ab04b3d80899c582e3c0ee3a1fa87bb0c13f110dec456613f052bb1094165f5cd3065dccd7e1fb8a877e88346c7e36447fa03f295364e21d206adfe1ff02dca4208aff854e771fe694ad9630a9a3851d43f229 (encrypted)