# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2042a696d534e95e2c6dcdf46a6c28dd41ada1deb3b06cb1827df38d3f88fc74
Pseudo Output
ce127002fd520a3edcd03ce25d4f3569ca8cda87e24593ef42ab368eb3d1ff33
Key Image
b02b9ff2b72a61f77a6e48f88c4adb4dbdf97e1ed779b8de8f87006e08dc297c
Pseudo Output
9ecd052c556690f8bcb2da6b0f27027c1016e838f39f599de6f57438314fd937
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
36947e391cb3b445f5831a6fbe48da4a9c9c319052a681467fbed72b06ac8479
Commitment
ea40df3a873115aead501fd28f7601f83dc2fb5ccbd0d5a731c9ec2b408e9b1c
Range Proof
672 bytes (Bulletproof)
Memo
75b9411d876846b3fc8ea0aee745e58eb9355aa996b80303dc42158ce5826838c63c0723712189bf3ec033b6ac0f7ead04b5cec5cbf6617d596c47d9d460c678da63a7a309b8731a8c05449a4c668e839de23fc4a453d0325fe558d45a12d8290cbb9a9e97538521f101ddc84a93d842d317fb758561b4a917823ccafc4d76a2 (encrypted)
Stealth Address
2e500503aecc8d5ed8dc2a92b7e753f99de711368894b24885f8b2f256482477
Commitment
8044dd4c0e56d7958590628cc3207726c72536aa4670e8db7f8724d09d222311
Range Proof
672 bytes (Bulletproof)
Memo
81cfccac65a7719e6885f67bf846305db12bcf389db3cdbab035b771c2aac22d6c29aaf4f3edc8bc1e7a055b8cff0b53c9fa754ab18225367b962dcc5d6bf4385e50879d093a59b0eb4a669eabb9cfe57985e77fa8071c649cab0015a8238e376c1dd9cc663c340361cddc1d60b96a90b4bb816231ab73baa97c8fa0959edfe9 (encrypted)