# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d46ec292581c8a99563e9986b2b79fabfb8d3d65d8724539326b1e7e0dbce134
Pseudo Output
7cf0ed446e26a358e1a0de886b0b076e67115916fd80338a695a4e1d4f333d4d
Key Image
18b5afc473618187a8f537edbddf15c34e825407534e3e6ea0ea896ade383d27
Pseudo Output
a2436951045bf30211c0ed3a4ce9ad9b638f5a7418bcb686733b274f82569a4b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
489f14563dcab60e810f62560659c2f606f41b74f66c72a98af2afabf6d75e1d
Commitment
fe57ec738f3770cb37a97864b21d1aeea16a95da5bc00213efc7dea6486c6b12
Range Proof
672 bytes (Bulletproof)
Memo
0b377d95050c99584c9ed7d30bb32e16bc103ab6100a56d4fd4be49d15c2b3d493d193356ecf79be4d324934c3d806d9929a02ef45c9fa53ef1a4c445e17cc713579349f0e7f0a5512cdf0552e22aa7b71140e59557b486e7ce37199a2adec872568e79174f04cc46233d49727db2b24f6d6df32b93d08301eb9a0ca3f833c3b (encrypted)
Stealth Address
5ab2ff2803247eff39cd8a9fb877ecc3c2a22682478fff0606e06493fe90ba76
Commitment
8abdd0343850602d0b91371ddfe523ef6b95a6d857e63b9495b5701096915c46
Range Proof
672 bytes (Bulletproof)
Memo
1b47032ed8ff161142dfe6d1b89595d0f2c68c68e4d92fa4eeb9fc4499a25e1af94742e2d61fdf9a7b8a46420adea7262e288a85985782184987924a633eb588ac9b50462cc76ebcffe31089193bbc0689fb8664cc067c02c9149f65c00bab0154835804f46d6a4048cea600f27771d0c55e7dcef8e645843deb13c96ebde642 (encrypted)