# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d606a974da28d398d6df9175842cbfcc42366812ab138fdf6a320e872191866d
Pseudo Output
3e58bad60008c026817cb0b2d02b742739d9dd75401c380b15d32f187d1d1b72
Key Image
7a606c27d9e7bc22b32e8c9822f01b846362fa6149c9063c55c7715c1bb86c48
Pseudo Output
be1355cfe086a641433214634884cea9ccae35d5e9357c20ee4a8b170f699940
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0ec09fce4e0f23fe66f7ac38d38643e5de6c3b183842c1159b43ebac05dc4567
Commitment
ceac028d5e0ec0adab5357ecfb5cd8972e206f1b47af013858db0327f67ae75d
Range Proof
672 bytes (Bulletproof)
Memo
ffd5747876023a94bc6a00fb70f649b291aa7f18c8931ec251ca5418e7270b3e1a2232d6a548b71422c04e73f3ab3fa887aac64ddb0d08ef0015c5a730937b29aee7a70329ae85c6ef22400a33bae35ccb75e2e10d07460dd61f19b838f0f11502c59f5dffd0520ff1d1a46e0a6a8304a6659df1c7e6e821e0acde8774983c44 (encrypted)
Stealth Address
9a5f2fb2ec42ea65de81c63cf10e36efa9a706fa1f7a166140a7ab29a19b001e
Commitment
7c865bc69b9ea6a2c363e3788c8ae748ac7f92b2fcfe3e2c2056b8f992b1c83b
Range Proof
672 bytes (Bulletproof)
Memo
765d94be3150f26fa2371361a49524c4d2ebb56128c5679610a5ad3be21710a38f0fd0bdedda46a7a04b22268a0fd492fb80def024ed57fde5ac80792ee9a251fbe9880b3d116ad52f53e29e821ab9867a10d0e6b259157eb2812359df942a4aca242e25d762fc68871d70b3eb5f329b77e7993a20a753a7a6ad4969d668d8dd (encrypted)