# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5a39d8421d4f21dc42399e49c0fdbc921d462459f9c0460f1090fcaa580df511
Pseudo Output
7696a423b044597c53ca05302761f2e101962125cb0c1e473e047f94b2f3c764
Key Image
9014dc2045f4b4cec63f1d6f9fb8cff68316da35a6cfbfe7942904303c67ce16
Pseudo Output
e47b19613eaad099aa7d45582f90ad41928637db2f9fe028e8b56cbdf9348c44
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9ef3d6aa02e18f74b4802d7ff710da9c34d4af6a17588ef1df6414781ee3132f
Commitment
968c3b021c9de4fda4490e1a5868c6dfc71a79ef67f6efa26c5917f9621eb119
Range Proof
672 bytes (Bulletproof)
Memo
42819bda1179d1496dac1bbae96bf164c328dfd3a57d4ff5189d109fcdb10a2f92e8c349ea884b7cef12da6d3687f87a653a732764e92c4ef63dfb8e4b2b042bf9960b66d410a28f9742f49a2b745a56b4d5de9012f8aa87b2ef39711c2af774df265c33663017ea01ed4abeae9392f5e7a7785b2380270729050993cd0d8f16 (encrypted)
Stealth Address
a0cd9d6cd60e48fdde358589b8529c2f876279cfc45744448a2be6111f27cd66
Commitment
7ef6683c6a39baa980951e5ee1cb04536a65a68c46ffc1fbf8d73d4fc29b912e
Range Proof
672 bytes (Bulletproof)
Memo
7fa0292290f3b3e367df73c0cd410e2860abcbc89e6c136faac47700755eab04db2a2e3b4515dcca1d17d70047d2f5fb904aa2d1a546c27cce39daebaa4a1aab486d448998a30b2cc41374d54321596313650a9f1a3ae2387e89a7bf74af7c75bec534438080634242ae9981212812677724df3df1e3fc6845c6128db2271b8a (encrypted)