# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
bec4f60034903e50297dda563b70b2f81c4f475fa5f0cf7608a9b7cee1daf234
Pseudo Output
907bd84521d2bb49d5e9c820aa6e033ef4c7c158e62dc7dbba8e88b01d6e492b
Key Image
4a2b4f2cac2a20aab9a9c50000b177e8a02d971ec1e49d1c8297866c18d8151d
Pseudo Output
2e406e7e4e759daaac1bcd0cfeaaa7ffe28591894363089c47ecad9ae6da791a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6a5b4f42f4b9d36b6e783f4aea834dfcdfa43b3fe696a6aa4e4906b3e15c156b
Commitment
74b524fb344741b40826281d684e74231ab5bf5ea7e6c4dccc4a1baf5b39e305
Range Proof
672 bytes (Bulletproof)
Memo
538782bde0bd82ab2352bec9bdf885542c1692ceca2a18d16fe18071ad449e3f330010d8c2d61921e960e79482adc4dec80103dcd16362b9f260303de119dec4661b63871e3feffd186bd71703d894f247425019d90f4434f15a0c5530e5594cbdf236f45937968ddeb8c70080023443d333c99b234769f8c8730cb089614b58 (encrypted)
Stealth Address
dcfe2b895644f6150cb1f32951cd33fd238e8517746dd59531272d5742f0316a
Commitment
bcdc1fe3a74e30c76a369a6d5aa90f1e0f3cde7e42cfe022a62a135bfeaf9200
Range Proof
672 bytes (Bulletproof)
Memo
a104a04b2f86b2d5be61838761a3c2c504e251abe6a3d89ba25334dcdae374be2ae04a66519e039558cef4cf8bd10d19ae38a51965f9f355a573196489956e2fc5b2d442854302b51f51ef85267c0582ab452a98d18315b7960261b6fd8c707679aad46f6baa3988d2c6646aeb7c7a6db0012bbc0de7f1cf82eafbcdb051a2ef (encrypted)