# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ea29322adfd01d712597f6fac204076a5079e9c4945b9f93a5b0d345b67b027e
Pseudo Output
f8db6eb2635841fcf1d108813c8aedef84a32ae24af5e953c4877b51faab3e17
Key Image
9600b013fab100d18ad829f6c1b10f03f945b801e0a31da92a20d734be86b85c
Pseudo Output
08ee353a06d585ad593954470c92c5f7b5c47188b480eef35f03fb40d885491a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
68692f1e337117e588255203b021bb6b457b9aea3d400d5ec323b9b567e05134
Commitment
d6ff00355f023fc913c9287a9b57f63d79e052f8538a96b17b11fe7ed355f31f
Range Proof
672 bytes (Bulletproof)
Memo
aaddf4a53503882e6579c518f2e132abadc9a5d67b5eb86fd6fb9d535aa5245fcd2f874cd02cf0d52bc4e7bc05d5243d0c1bc8856e5952a57c1c1cd9682029ac3b43474fd973521e023b90885dec187aa86852806d10ad46d4efdc59ef96fc61eee5306ea0eeb1ee822cbe43bdd534eec920ce538d62e41f081136ffcbb86d81 (encrypted)
Stealth Address
58a0d9bded45dcb3296507ebb8a134ae9fab019ee114c03fbb7d8ba2359bdc1a
Commitment
36d67951a6848b9c439122bf44dd668b6535e6060598fbb2b6242e10a656124e
Range Proof
672 bytes (Bulletproof)
Memo
3868dcdfebcfe8135b44f0b9ff55ab1b814c0fa85d01c26689f34b3d0dc1ec43d000ff79067f421825a12ae758d89eb22096e51000082ed1861cb5c2f2fd8d6a7ea109fdb740840cfab5cf90da36f0b877521207c16721e31c7ca5bd6b8e9ded3fe67b5fc507de9bd4af6d2ff4bd246f08a57e052c36925e5cfa182081a73baf (encrypted)