# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
bc0c1141ead301594a11a302e8b700b467725b85fae263e2709f859ae0ba9426
Pseudo Output
94e7af4a5912256aba1601c1995fc75cec7669f2251ec6ad0eb153bce13e6c4e
Key Image
26f7ce5048df08d55bd3e2ccee5fe496b8a022cdc69feeb36f4d6f35cb034526
Pseudo Output
260edb96851ccb67c75a69a658ff9c984d41bd525aaca71223ecc5506df2c372
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9e79f744999f8ca6e2ff1e3ecff796b18e73bae5cea8408094198d895ceb652e
Commitment
668d731e695c8f2c24d3844fe16854331e006f33009435da74e05c4517ea1950
Range Proof
672 bytes (Bulletproof)
Memo
42989eab2aaf549c6b4e1a22fad1df4fa95343d29c184bb5b5b9a56471db85039dfa28899435d8458aaf53e5546e6db5c573c03ddd72352b7e0fedd212807f6f91239872e35214fe00105899b5f89fc2119f02ae9f6ae2eb68a1224c321e0c87d49ec24451513e39ddf6d957c42b340cfca45149fc22a596c6ce5907cb34921f (encrypted)
Stealth Address
4eb87c35181d08ee15bea147e7ed8b137ea08516cddfada774854918102a6a2f
Commitment
4e1a08029fb3d7b5788339122b3ef9125f874e35ab62bc6cc7550942d638485a
Range Proof
672 bytes (Bulletproof)
Memo
38d95d27a70be5490be1167a647698f8a1246af6e17f7f0b8da5537379620120b02d4ffcdd4148aa6ea59dc3eeb258c924416ab2b404c28e6d6829121928f057076b2c01e0abf93aa40d674546c8be6674220b82241113a7a33942a54faa185787c382bf1b58a09c67d08e1443f6753f7ed2da95bc37093a20813c9a5f600575 (encrypted)