# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a84b0060b4e814a089491f8d08070890417ac7a96b43f759861ba5fcdcee4f6a
Pseudo Output
0cfb79994e40aff891a2a857c656b33085d091103011ae583bd7f0774ad4e934
Key Image
b86d807d61e118f9b884a2be5e82d16317b7ed10aae94b623acd70480743b405
Pseudo Output
68d3073cfe25dbee2b7b542f7378daf1771c51e782db946015d3258f6f44e818
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5e612c85a08f6570b6508c4d6b9863fbfc9bf6dc1a1f95156eafcefcf55db70a
Commitment
d0fd89e306487c0166a67a3873f4a5407d027bfd7785af135039c78653ee213b
Range Proof
672 bytes (Bulletproof)
Memo
1b9416ffbb03fb4b4d81525b45f283882a0b202feb2d999458d3dac04088342cf692777480fbd95c10cf8f867ad706237f28d28616ac9ecda68ed2f644f5b9f8bf8f58f78242e017ea65db80fd81e07380b098658f5a82c512493e4e6e8c371a0192b7b81fbbe99adc1e6d2c001ba9cd9c752fd2dadfe9fbb62ae9eba5e4ee32 (encrypted)
Stealth Address
64bdef0eacf28ff7f089c9c18895ce09a98018e24d13973e5eeb2e6310215501
Commitment
ca05ad3aa3e05d981b8ce1be095c20923ea655c460395c3a98ad1da51060d005
Range Proof
672 bytes (Bulletproof)
Memo
3a34e89c8d6180f82958284a99da952502541c0ece1e15b5ca2ec38eea914acb3fe861f1946cba333626c6c4646ccb9976cfd1df987ba4ac1c1cccd5179424c741e891aaa335f6284104d2baff59935983a8e3257bbb61f6390b09ddbae70a3cd00029fc40e179277c1c79603fc658735bad7b54d08ba892b122820cd740eb52 (encrypted)
Stealth Address
784f8b215ba72f505df04b4fb231b2a03bade3889c0ce72872ee0dccafb9dd1b
Commitment
b6c29a9e390ddd836cd017ee2d05a810d6fba10741fa859a50bd5d497010ac61
Range Proof
672 bytes (Bulletproof)
Memo
4747aa3772bc66aba3b1b5483ef2257023adff029f1de01dbb91d19efafd24c2d5dceedc23078331538b2ec7e1faca4d35ff0c4d8cc6edc712c536ee6f54d213bd88ebe378bfd0900e8b98fe0bb0e9cda6ad83a1c83a20fc9ee647469e11177307436a0f4c7e6560076ac7fad9bd37721a2e0381151974423922c1d26925ae61 (encrypted)