# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
600689d3922685c8765388f5efe85ff39b1ee8a2d85b343e389aa90f067b8c60
Pseudo Output
86e73d443ef6dfa73dc6a970f85ad4e844ea25b7698a06231c5b090a041e6c31
Key Image
d0665813fda0f8ee6482796cbd37892f282ad3d50f4464d331a0362910f64b23
Pseudo Output
aa4e6ce26afb92d6a28b4af11c5e906d2269fe0637ce9e795e913731a8b5123f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d0a584b5f9e20486858a4c90deddef065a82176467df0ad78831152a976b5e52
Commitment
aaea79fc9fb76a507237a91278b0ba14e01ed049924b6feba6aba6dae413a222
Range Proof
672 bytes (Bulletproof)
Memo
6e27cfd18110c862f661ccead628a290e641922f26c16d6d0bc9067dedfd37abf336d101c03f9fe1d2e3f21d2129c6b66626c3f04eae9283f758cf137d6c4ac041e80ba191e88d5fb704480bbaecb895682666dfe8eba20dedc3610ba3d86bce05d2518381f59f72798afe1f2dc4d427f5e38846a99494e8b35cf47f95bd2f41 (encrypted)
Stealth Address
acd034a1bf947f8ae4da06dde87f2052360841f55562b2648e361153633c9146
Commitment
4c4bf4c302758ad2ecc4dcbd7ee378ebbc807ad37d43ae22ae9a6e0c8d343945
Range Proof
672 bytes (Bulletproof)
Memo
8b7e1faf0e4552f22f895dd5038ea063d5aa74d669d39e758e2e273e91216157ae0403cfc19fa4e5d2b2c986a9ce5975ed28dbb513f2f86e052f80a397a20281a8918d3c143f29256366df326e1f68064c755b29d6fe03140c6e68f16444379799c28c783e7a48a1a6a28cb298069a779a6ea2ac101e93550597ffb7c4e42fe8 (encrypted)
Stealth Address
387b79161639a9bf744463c03db89a414958ef0930e5a71c32ecb53683f33b33
Commitment
4cb74f224d0668d494a155c5f88dc0f264601992f44f6d8a775a1392682d367c
Range Proof
672 bytes (Bulletproof)
Memo
0f14e7b7259b3f29383b477fe3e350d35bd11f0f6ee76a29932ac2fb556b92e9d462166ff70d633ee1068a87fc3cc48edad80c15868c157822c1d4463dd849ff7d6f92736b7a4b2189588744f4b99cfce213021f47f29ea121393fc7b9c028f3c93b7a55dee95e6eff48ab985ff46656472220890053a3d0310249ffaa482867 (encrypted)