# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6a9b73e80b761847699782c08f5f8c6a71a0ce753bc73166cc5f07ec4915e637
Pseudo Output
8838dd80f16782cd4b7dafb21023819439e7f2efa53a4fe657c77ed972a01a07
Key Image
728a2baedd6171cec2a8d80b3c3982a2b7ae0910c786bf0451da066bc44e2f2e
Pseudo Output
c09023d707fb3cbc13493116878cf73ddd1e770139ff88996e633b121580eb07
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2e47e22ad80778ef5f18196ac446ab4dfd9fd4cf8dc69bca075d3ccc5a4d5c18
Commitment
9645fb3eba6fe56af9c5860474ba7df2516879e6217bff357602f7b83a4f6312
Range Proof
672 bytes (Bulletproof)
Memo
d681eaf314dab0f7ee798dd7a2c74f166ec87b0fd8787819e43dc233c434af19516ab2be105179f7629ecf326333efc1da4f71ab2abe0a8f7225f4c599a4a249e28b96290f7df56ca80ba02d1504e957e03db863787541961721aa45742d7022dddc0275f8643f6e663343c4ca0e59d89141b6efe90dbffb9a1d44893d1462f6 (encrypted)
Stealth Address
7c25090ca59cb689d388de372db74e3fb700909a8211135bd317e7e645be943b
Commitment
7cbe0af49ad9f33e4e066b996220465dd106f75b259a70ce7d810cdde0dc5b0e
Range Proof
672 bytes (Bulletproof)
Memo
711509e222df029bdedb8d20dfc3c7d32b5356608b93b51050dada0bcf091466fac7e0a38f40cef01cb22b79be274142535ee4669139877f45ca665971e349260586fe17804feb6555eda44832a666882b4155585c6fe2a0ad53cbe683ffebc20dea531d8c0b42f11223ddb0918a70a28b5cbbd69f296e5070f29e6928665714 (encrypted)