# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aeb4f65c5d5baa5681133bd828369d79d02d70e595f6cb3cf5a24f3f94fb8d26
Pseudo Output
1e219ef2b9e4136d5eeb1c9bd2c61b76afa56734d9b2d037e7a0c07236d50b77
Key Image
62d62badce6b0b95846ce0b46cb1f418fe5ef6602faadb5746e2f1273d716f42
Pseudo Output
eed01acda19378d988e0bf5c1640428345a938e20cb37a437518f7915d5c617f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8a3e73ed9e6630be6fdbaef9162109477f058d97eed77c511ff9275878df4f11
Commitment
5aafef3fe8955e6d2f6f5410301484e6125274d012d26e9febea34f462bdcd52
Range Proof
672 bytes (Bulletproof)
Memo
af52cbe7aa900233be3ba50fd73e4d8895402a7e181d270b6b8da7e859ae100ba13dcc3d562d7effbfd19fd5b4402c4388da681d21f1fdf50954d0ee60d7c73cf005145191b19c65a024b5710635d362e4cb6803daa8d213835476e88a3ba18c2ea9fbc90c7ef93785750a5ed34668246a41ff15b56ef179a8a8d071525545e8 (encrypted)
Stealth Address
f4c93529908a11ab51e3f80378a7a7147d6f06517338f38cca86a759bd8f810d
Commitment
0480813db8b0e9ff57ede2f80c0206f239c290cfefca68b6b285184068de7710
Range Proof
672 bytes (Bulletproof)
Memo
0bae57b6a942f660b7142e250f771483d9fbbea8735369aa0f3e231bb9f07fb00461824e070ad731e72642c98f75792e8a88696d07d2b91bc9da5764490e93c4c11fba5aca604b5031c521b93de9390632a943ca0dda86b2f8cb8577f0873fa60e8158a5f8ccb6b70fb642c960b9c6ca366f887f03090d2fa985ea3e65ea8578 (encrypted)