# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
74c33dda2134e0ff33eadcf91f256fc84e6d33819566400c1bad663595df825f
Pseudo Output
eaa118730cad4c9a55f31ce63c9f5968284f6892c6c675cb27d619301f580d1a
Key Image
966966e95f4f2956380e1664dd6ec51160f4056b06ae1ce4b97b8366f181b720
Pseudo Output
4a5e51c8ed29a57d495e8ca3cf63702c57324960c539b5be846707bc34c58d45
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4e8748ef3c0594c768deb36544ae3be5fbfb77bc0fc6c31a88804bf91b508c33
Commitment
46a8c0ea7217b394583fcd0fe10e89ddb2ce085138a502fa44b47e83f3eabf05
Range Proof
672 bytes (Bulletproof)
Memo
652502f8f49d56e1d0623973e1741d79b91effa73113df13fdbfd33ca4fb20f57994c7daba64e435a47b4a301152e4893e8dee10e70d292233daf1bd2f2ff7cc6a013aea3046fdf572760918415f9d03bce38d27aa0ebb54dc88960b77abb7ace9b513f75dc8791f7f53af15c3e56f792dcaa42955462d9905f0ab5eb376bfaa (encrypted)
Stealth Address
c4d96a649c1cfc61045c63af5a2c2ba507ca496f86540b60ea6e94bc14a69a07
Commitment
aa08c159dbf01de3b03e33532f4749df26176ca3ec742a581d11048e88d78a4d
Range Proof
672 bytes (Bulletproof)
Memo
5b379725a6a8cc173821b78ee5b5a653104513fb419a3688639f88c62ae49f0bb3d4fae406111d33a9f66d4475ac1950956c5bde5f4df922070c86f46e945d8a50d840328b6d55f54d502a8430c3433de5648f4e19c6dff35f55577124518163308a3262549ffbfce87b473cfcf46f22c89fa814d10728cedea38ebe51c099c5 (encrypted)