# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
143673070ffcc9f29c8bb72bb3784b063be0f34834deebda14326fa7b149a236
Pseudo Output
4c30700c947807296bcae427fee211b24db2cb1c3414565909b8d13346adef30
Key Image
3c9f150fcff8b9eb6d6709226d9e912472d7b2c2d4861ea2c243c28079395d42
Pseudo Output
9c713bea88a1019dcf2205cf9d5006bfde30af8b2adb12dfe24cff0b50d14f0a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d80de0d6ae5b1c0eb3108fc2638a8a9b5e30b2c0808e15cd18e1d50b9a761c77
Commitment
02350e80744430736cfda019fd4df680f8d3aecd6b6012a1278677e50e4c4b4f
Range Proof
672 bytes (Bulletproof)
Memo
7c38025aa84e30e1c2d379db1510ab60cafde205a8cc9c7ddc669a7002b1684378ce9530c6b12dca8aad9a3e94f5668ef54c0e2524e297bf72c1a6c70560fe56305bc735851b09c92aa4528be8044c094a10765102798eb8e3029d681cbac4168fc46078d0ed04773269cefebb79bcaa4426d827017480c03de402420ae62d01 (encrypted)
Stealth Address
f6b24fe744a6381f7f36a8c1aba4d80446173948da821a3a3610286c7f873904
Commitment
34279730d31b1afa89a0248c5799d87a880862a1aed868277eeb3d1524f6b30d
Range Proof
672 bytes (Bulletproof)
Memo
e526a7900d569fa319dd9e2fa23b62b11c8caa396273a0187a6e3e3fc21c293503ffceab461ef0332a7f815bf96653f0c028ebc77755dea896f8f80cd682762163db1c6f54edaaf5248951c088645b26b9e474bae95f303f3678861e07dd4f825daadd0ec668477e5d505fb68b807ad81f6409ce413c385b96bc821a5c15103a (encrypted)