# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fa7fcd569151ddd70baafe577db16812cd49f258ab5739473eb8ce55cb697740
Pseudo Output
88813a4f3de29be6118d54706ee0d87f977f82c72e2a81cd524866c9eb5d2104
Key Image
90cda9ee2ca8eb764a76731daee22ea26deb1f360ebd8eecb2bef47865abd80a
Pseudo Output
06e11a22c9e12c35de3f83491a5ccf8fd5e9f2aea99ea8519f6ad2275a0e9017
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0004e409a61c4121930cddc82485cfef4f3594e06aca8ace4b7d55634f8d1f0b
Commitment
20a220f29677ab9c45da12d981d3cbac7d541ee6aa66abe32eff903ccb5d1a75
Range Proof
672 bytes (Bulletproof)
Memo
8bb25a79ad4a2b2e371bcfa0372c1cc5096db5b4ef8754b7ff1715153ec34cf015cd410ae18e5b73639f05edbd9c58f8b2e33c046560e0bd5c6cc4105cf3c1d9d1c9b015f836e6593c5114c961ffa4aafacd97e1854a22ca580db223a630f227f1b7f478942c9b2efb0498c7d490132678d3878905732da8bbc12623bb3b2a5a (encrypted)
Stealth Address
b4e1dee9a9a3f93fd6983ab8e50494bd6d68c2d2c97ca78083c3c590424ea226
Commitment
00627b5ef17377f1ff2610c937219281c3c0982791f0832d8f4ae6324bc67733
Range Proof
672 bytes (Bulletproof)
Memo
e71fa4d7f7069e39390f1f983bdb924b97f71e74512ed0278839203d8d50002299e7344f744ae052476eb9a4883d0c9fc898f289425e1ac0105902ea0aa1c9e6f7503ed66af8a0fcaec9c9a02135050ed417ade06d563687abf32d6af9a539d51643df0b1dd0f76ad416a6bcfcc80c579c8cca5dbfbde22bbf8548f1375d3df9 (encrypted)
Stealth Address
6c064248c0a3b0bf8774650769866adc08a7100fe2437169ab8558961bd5e126
Commitment
fac700069af4d0b6c4d8fa6c07fb5381ee24ca6158e961113425061bcc43665d
Range Proof
672 bytes (Bulletproof)
Memo
4d1d95d2c255c56fc4ff4f7e9e36f62b2448050d7ef89f884df8a67f99c3eb7e9e296b11a2048f45a56454294d6d0aaa515a9253b21fe8812e08187ae3a776a2cc54966436e6687b6b467b11dd3fa1de0ed7f2fc6daea4d18361ea7e019f7c0683661afbb852def302c17c3d8d73653b74091607677032a44ef3ae199edb03ec (encrypted)