# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d6c0a2b4bef3351e9ddc559db258163c4728476b09ea9b00f2653ce1411e4359
Pseudo Output
7a440ba86ae3fef7b7d6ab41db7063ac0d788a24dcf3feca844b6f1c5110052e
Key Image
0a2efcfa52efd201c62c3d912664ee6a9479be851d4de82b2523040701aa5634
Pseudo Output
f23abebcd80355217b9cb7fa91151ffabf19a38e809d37b5df901bafdd9f9228
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
509e5ea01aee352583bee261692826bc86c543b2c72a3a889f9a2a04404b4379
Commitment
c42cb5637bf93a54c209e5c099928f41983d17d9abe5e551c43a7c6e2e2f6171
Range Proof
672 bytes (Bulletproof)
Memo
b6d0cae14c9a4b159761372cd44be3b51f9bdae787f0a57e835219c30b00ac36e97833c105602b023467621882f0620c562196c66fa346e015fd6c77fd8e969a76ae3b67ddf1cdee76487078a6f4ad9c43011da0efbaef05d758912fa5dcdecb4d9879bbee6c7f8c4b2272a6664daed1ce5a67bd7fff3d19d4796bcdad93ebe7 (encrypted)
Stealth Address
b4af2049f190346e18e9ad43a50aa3ea3f6bb49b2c8d020d12dac73362ca4569
Commitment
a41f996f08a4888f70314523230219e76aa40f49decf34ecb45fd4d82f42a42c
Range Proof
672 bytes (Bulletproof)
Memo
92d432182551b0b0d0de6956c921dd4e664c91dbf5a424ff6985943b694a6b5208bffbffb5ccc0bc32cb27fd437ce6740700ee47bc056d0ed16bd19d43e19a2f6e1e71ed3f0e969e7a974d2a60e1014e5c581a0b4e194fb2098e50cdf37c7ce8bf3ab88470b2c048c7ff0a208797014d62eef03e8d7826b6650ce485a1fbf20f (encrypted)