# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
30a77d77c93dd7390e719a80511621b690a1e0e0d23d1bcf226898f73859dc20
Pseudo Output
32e46f63f2c6315bb659d255353a855f4ad4440d9e8a4dfeda2bc74a6bf54147
Key Image
e2d5ac59f21e02ab1654a7023304ac22ab4836b90ab336af5786fa21f879130f
Pseudo Output
3e0b3b614d552ed806aa187d431c9722a923c11f01b113ac96900051a45cd630
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6c43d1ff099515acdd15b6f19a72c607f91d2a9bdca2cb54ca11ea2da8f69d3e
Commitment
045ca2cfb192cf060fdf6d9fecfceb5c12ef3d23a0410d6b6610f695a1c27b1f
Range Proof
672 bytes (Bulletproof)
Memo
cca81b9e8b26edb2c226dacaae24fd0fe72e75178e4580f7e1e5dd236073e39e1130e19e95dfb728a7c28758d263ac446923d20aaed8b6823c28d6ca76542f8285eda5606571ffb1fbe6d27998612a3de42098859f74137027a189dd9f53ab8ea80545228cf700aeca3cd9315b9c9a92849e73b57f04cfe67ff526a12e598ca3 (encrypted)
Stealth Address
12572ca338f374dc3079e26076c912975d543d5699185af261d5f5116d6b267e
Commitment
dabdf4e0e0f8c0b8deb8c403913c29c3741ab9f7de5993d83a56053238fc7a72
Range Proof
672 bytes (Bulletproof)
Memo
41578cd701685dd40cf360f4a8bb77aa9dd7a2f360bbebefda8d72c0640605fbc973450941774f2ac54c7f30cd2fa9b3c3822f26ec269425c8844f2f5af13548ee6499cebd6e0fddea85a393538fc413adfdf496a2457ff972fd4bd0338a90033a3fc8ec51b289a1286ce52ddbc7d134988d53a3712af427ae29fcfd3e199214 (encrypted)