# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3e8a51c031547b13fd1a30a793f3878107d8659eb2aa1b6a7782c10a38c1b07c
Pseudo Output
36a7768268ba97743c4b58ad90222427523826a73984a64ae4b2ed2e60bf9c70
Key Image
fe56e39ce8128c3b02bc503d4d7585e6dfdb4a5291f9ef6c1ce5dbb61d058f51
Pseudo Output
7ae9572eef8d05e012fcb942b49a746b3564874a21b81e3c7cc6d207bd313652
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d249c6262158af9cc0de88a075b58f859f1dc39534d42e7035a3a76450c53e17
Commitment
30d6128517171273f8a49035ab91d4cb572e5aaf263910a1610c7ae2455d8e6d
Range Proof
672 bytes (Bulletproof)
Memo
f46ef6e95b22ea62ab1510129f2cb19a308e87f16f238dcd4a375be9a8af93a274da61ac5f29eace6961708e052fc854db765248d5b5889afd9736c8f6081b0bd740189035609e784bc6aad70e2db83d7d5250048df9fb08b02151fcec4af287222921f0f68adc114e7360a4568cff824d67020d1d6b4561555a8e7045e78864 (encrypted)
Stealth Address
5c1b8a9c319e32a439b213042708cff0a315e88bf13eb95db4a87a3a4d458339
Commitment
4cd828643342786026f8645c6bdd973f36c27e3cad66a27e8374bbf985bfa75b
Range Proof
672 bytes (Bulletproof)
Memo
cfc1d912c6cb7ceecbb8ce06ab0bad8c54baf09bbba0aded25db2f7659f34a56df661dfc966a757137736c36150d9fbe10dd40a85384edd4e8d46a3cecf2a546681d070563d5071f320865be49162866180846f374309b69e1ca9d1b8545d4ec276d2b2ef63f166d06a4136d657031e14591081d3125a8b964b62f256284aa1c (encrypted)