# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8a93fc2fadd1134f1cfb30f9fd374679c88243ac0ede181921a76a077bdf3842
Pseudo Output
f010e8ea85b3d431b56acf42ccd12214210d4b198b70c8eecaeef77115d83f6f
Key Image
cce3160f7cb3b44080de1f5d7fde0d91c458f09b0efb6d3219109bac7d2dfb5f
Pseudo Output
42e3bdb73b4847107e43292575fb1d69b124e5a580a44c933ced7e63b0b2dc17
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4431f8e35a9411205f1fb4bfd6fc9b01edf7ef7e07527ab81dd07947d4d0c811
Commitment
aaf7ac5f76658719f1c47b204d860ceb8eb3c8745a42b65c977d2934d2caa20e
Range Proof
672 bytes (Bulletproof)
Memo
6ad5b0e14f9268d1c885d2e48b6b60d8d7167cf3b06b5b960fc431d7405d41f6362a847f66c352bdbc4c5442abfc6b45a82996d742ef70344a266e9bd316ef1587f53e00e0cf651d3ccfd05812a1018194cfa2ee3ef3e7dc4176049b5818a5b5e714845f57339e23eaee958b4c2aae041ed27411ac8f173690124dc24258f054 (encrypted)
Stealth Address
8448fb81bfae6c478842a03cdcfb2acb734c1a1ac807309867ea49d0d52f250d
Commitment
08b84b22ee66aac5027f133ea6adbe02ed3fae516f031b55cfc409e63bf9ad74
Range Proof
672 bytes (Bulletproof)
Memo
33e7baa95e61cc05c1a11249ad874cf461b36f3cfaeee29059d88c5acbf9fcf7d7ccf18e43e2136eebe2f9d3e7b311c88ea3247fc9460a591f83295b7f97a9cc825541bce7bcbbc1f4671ba447464f12c868348daa99ed5c67a108a331cf87cc3a3dec5e0e91178d1513138fb144ff2395c25c96d36352e0f792b6594b78d21e (encrypted)