# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1e829dd78d0da7c4b8ed07bc009b690d1f7a4cd7ce50ac031f67a3cd1862d125
Pseudo Output
a6149b87da64f32e679990cbd8d6e176c892abe283c67f8d76b3f60f7f850d48
Key Image
0614ba1e22c44793960ee7753188da6c59eb822556962f0497f7ef3e0813731f
Pseudo Output
4c44fd5818f78087d66d438551c7a2bc83f38ecd9d5c7f0092cca88266c68677
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7c578110d58823503ba54ccd1e64dc118b1318acec971013c96a0922e36d9e00
Commitment
8c04e774a5ee6305807061233fe82f7a248868b7c79b1be0fe538c6d007a8e64
Range Proof
672 bytes (Bulletproof)
Memo
85e4ad2c63e71c64fdcf9bf4c3e0154de0eb984eeaae99210604dec430562bb4a8f3e084c804afe8c8c31559df09c40e0c182c1fab92c427081cef85edac996cb8457fc3c88a85477a066094752059ada08d0e7adda8f3b57a2f151a0e7e8c2f5721d31bca1aa66c8720aa6ce8e3f70339a753f69900c7b258b18219365b1286 (encrypted)
Stealth Address
8ce9da0e83f7341711360ce1de8b81eccc6ce411f1556463b0842578f3b7e418
Commitment
1202cedb1508a2b3be13e202459c8de1903376bec07ae30eaa55b51a828ee163
Range Proof
672 bytes (Bulletproof)
Memo
038ec12e32adbffeca82f0c35f609c4d07cfa53b8cfce23f9274d9032a8e7845fe34588778ed5ca0cd77d7e8fb6b34f3b09818c2f75a0888ea8ab72c0e8f88acb9f13257d4f7fdf07459593d02e0d80e08effeab79ba204e0530d267ffe736b4bf65cd9fcf9023cc2c5ba09b1d11ad2d8b2006724954a33152d184107f6ca833 (encrypted)