# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c4542500bd85951095bb45019a834223c99a08c5205b21be3b9b2c9c43f9d217
Pseudo Output
a82fdf2e69a5e7dbaee85c0413869ad8e6a79bfe86395a3feaf32a15b2136d78
Key Image
7e68850da62447bc53a4dc2c9b7c2e3bbae473bae4b20d1906bbbcfa61e92603
Pseudo Output
022f291496c0ab88fcd556085ce62b0a58b0a70229f2c11f33abf83e281c4803
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
769df30b3110cc6797d2d4a0873b516de363834d591363e45fb198ecb7a1d163
Commitment
8aa6d8375f7311e0efe28ccb40dcb7ff17f88fd0466e77b608e00934ea109b0e
Range Proof
672 bytes (Bulletproof)
Memo
6f5b49ae94bb24d0225acc178763110c29f17a111a5ef9c7f8448f3fac5af9222636d7f595d8a668769fcfe7b4d9328a3b9ade460964e38cf8d2177e27aa5a03dd5af0ab047a1e907791409233faeb72b23b934b7f3371669d9f14616059e48c042b2375aeb87696626502e3742c0e97d6d2bf972319f510e5caea364b74a08f (encrypted)
Stealth Address
423e0ae8ae7e7b6ba96e377ff3ae9361ef136e5087e6452bd25c9f5a4e8ea21e
Commitment
bc1dd2b2c064ebba07608d035bb8e8cd062557cc35f40b267df85fd0cc595917
Range Proof
672 bytes (Bulletproof)
Memo
77c5a3cc87180cfb0045d2e17729dc490f8955aad6e42e1149e064c655365bf38c2bc9473a8af1741c10c08ab1fbc61599bf0775349366615282f80dc0182b973ffdceaa31a5c4d43f4a93468512c09f44f19599a7b9eab51fd51654326216e894cc10264193dabce70ecfed6960b094277186dcc56da792d74d5f82c495febf (encrypted)