# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
70b2fb4c1d2302ef76a77eca4b33302b334f792b07df19cd1bf7e637e60da850
Pseudo Output
867699c8143782d0168b252d40fef3903297fb55d550ae63f6fd78aec44cf31d
Key Image
a254ca138549a3230656c915da9121228b4a4ab98bc94c0da28664bd9878a622
Pseudo Output
0aa1f2b4a68ac5e918aeb69ccfad51b35b021a8e94959b7a1931003342d2336f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
725d19fb8d209b9cca1f102376a6abc295beab92e00881c35a2c95af32ba8061
Commitment
c8f9cab4eaf887a64294206013767c7e9e78b40e81548d16da1525df8ff0dc71
Range Proof
672 bytes (Bulletproof)
Memo
5f621e6753f2c9e6c5e7393681cb3c04f18ee929dac9385aa3d238ac060f847b19bbe39c76dd40bc5d50f4fffc84ea16f848a5d9e218c255645b60d4104f0bb22c880dc5ff027dcd41ca140c55ff0034c856abd08fd70c0fc5c9dcbcf71619f6f1bc5e434f2ca0c747aa379a8e6832e034eed597682d209d8d40fe58bad43987 (encrypted)
Stealth Address
9e46a21452f1f458c1f3cf4516d3d63172a21d2ce4bc1ae2fdbdb1b31d916b6b
Commitment
4a7ec8206c6b4e6b0e7b3f8538842d16d659c4580f26c01db3e158b11d3e6419
Range Proof
672 bytes (Bulletproof)
Memo
06d0bbcc4da73a213d7c222337270d6fec50b01393562b25fda8f0594ff28a862cf2aef8023fa983a415918ce9bf175761866e142edd6215b5219ef7c498452aaafe785f8bb557322c79e5dc993c0d5c11bdc2a5f269f3ffcf29df64ac88f881ac76f016057aab49596ccfba3383d601f9568336954a91db19c7a3bdf0918a76 (encrypted)