# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2a1c2f6c28e7b59f920b4bce2d96a600fc2e32422e126ad3f0354bd9b738fb01
Pseudo Output
122471d8df53085f9ead25aaab30bb9cda3b0bc287165195c92b2529314f7b1b
Key Image
e0888ff0ae3d868fac12e06b7640b1fc8432b7ffc3bca7b88f4e2f3f851db558
Pseudo Output
5a0ec9f8be6befda3727f0dec380f8d6903af4ee03bd88e2eaf2a60aac8b6c0b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e20bb27e942a83122b1be3bbc1d109a07fb7838355088ff6b4db306e897b4d1b
Commitment
b27fcaa69d2d81217c2464c36ebddd6ff3c2115d378fdb98a6275ec5547a251a
Range Proof
672 bytes (Bulletproof)
Memo
47b0a12b1b2a9ca0e74f0657d2b168517753214178b8467728d1b50e9647e9452003ffb2f994bc4c8bebcb9a43ddbd20a0f783da1fa7b08caf8c8e0fd24cad67a6ee567cf5d3cbd76c3286108136aebd2c35d2fdb4db52bbc3e1f4416e721887ca7a89d4ac353889c1db12ee5b0d1588e71cbd2c0127850d5719c977afbe0fc0 (encrypted)
Stealth Address
ac4bfdc7e5f8a50cc01dc4c275e61767289c51e1ed27b0eb73ce796af01e1257
Commitment
82643630142e6bcd0a943787ad44c0d73a1685e50179f3d7dfe20bc2727ca801
Range Proof
672 bytes (Bulletproof)
Memo
b433349b37f59c71540d06ac9d49704e590f3bb0ce5e7b5c4b33d7f017ff3c39a5cb9bd1eb794fcf91929169fed2d144ff6a206e02428ed6e6ccd9912486ba3c531c819322da7be0395800b2e10a6f081bd1de0ce896f2d40100fdd03362d142f7bd340d21efabcf41ce5c7ae2fe16c93522f8352e903ecf7f1a31337fed9e07 (encrypted)