# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6e0da67de5b0ab37f492b24a52ab7e3b4f0d0d2bd7c7981c98c1f0fdc0c49d7b
Pseudo Output
02c3c69eb1078ea49913eb2136798162947c4ac0231dddfa0c7517b849e1b76c
Key Image
34209d428562906dea5bb68b86e32d17fd55de4deec6255bf30d40e2237bc37c
Pseudo Output
3eb3e693ece58342c215535bada607bc9e3c8597595de9533fd36b7fa398965e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d2fd4dff06f6ac5309d04a3919c95bae9b205ed22c50c6c91268a21e9a312765
Commitment
da7bfdd5e9c87d111ed3a1d55b3ca3d06dcc1dc783b74b39c08db62bddc78643
Range Proof
672 bytes (Bulletproof)
Memo
fe06f436f006323360c2fdc0a32e414bfaeb48d21eaa8be44d1ee13af47553bbc3dd2359a7762cc80f593b289b24345a31d2c82f51fe46534654b7fc97da682e5a5a955c194035a6fba443ad38cbb6198fbd1a9920f5692f9476bc39a3ac65073ca2b8d3c11afb68c04fbe7a19865124becc03bffa6276969ff7903192cbfb6b (encrypted)
Stealth Address
2a6865f899edb654e67d905a1da74f7a938c921e9521acfaf360d326ded94d2e
Commitment
36e783d13dfbca11f07fce0ec3430fffaa1624d4a19fde0181772e0e5c623b0e
Range Proof
672 bytes (Bulletproof)
Memo
1d7eaef73f190ceb8f4f1820222998c8ab7813867dd8a739b0f1623265d278165bed2818037626bfbc4b12f2545f95bdf42f9d8a83dc40ec00a19ec88e0ba6506e69be976ebd0013097cdb880c53bf1690e2da1b78f4f94eecd3d69b05e432200dda2e62cb89fcf7cf2c70a7820ee7eb111a4d11b14fab4d0942509542e62326 (encrypted)