# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b4a168180d05a624b4aafceeb352b9cd078651d403936a0054843667311f5740
Pseudo Output
881efe9acb4009171310135e7c62fbb08cad17aac859d34ac636c382590c7a60
Key Image
9a3e424d633d9f1798d35f884fc4b2e0b7e51428ee451675aa0d2991caad9957
Pseudo Output
6aed979a85465ef5fc505ea0cfe503d67b95530ce5dc3652d0b377e51f57485f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3a48cb171c2bb1e34c3621d64bb72190722eb499c3b7b4f25471ad49e301a369
Commitment
d2617292a446e82cd46e8cffbf4a1829b801b3dc6e5bc0d7811b927c35765e66
Range Proof
672 bytes (Bulletproof)
Memo
a50e45b8d7b82dac4a304d05f19e3d9c4bfad64fa89583327e8f074e007f432c706a2b23f14c90cc866c7f26cbdaec87970f8ca7c77cfa18165296358218c24dc6ac52772f68395cbbe7ed2a291b7f8477643fd1ddee32b227d66f3b34b2846f01e9ad5bf7ad51b534bea48be3a1f42f64d8ab066f5832f024711826fbe4aefc (encrypted)
Stealth Address
7ab676398f3a21b53df359cae392681b67f02f1c63acdd5d049a9efc12fb186b
Commitment
26d9f38c306d84aba29ede49f9b5d02dc8ba1b33163e8db42e5b3fa0d912e068
Range Proof
672 bytes (Bulletproof)
Memo
4c169f37ac969f3a12a369ca7cefea9690d0fb505390e6d94daed862dbefc83ff173646be6907d23adcdcc65ebb7eeb9160cc3d25d49cc5b76103402a4f75fb9888035df98cb327201872b5a9acae67f10f5a56e267ec289d767ea24f5813763d8aca88f8c643b84dd30e7f60eab9a9f71788f6ed91457fa422940c57fcd688c (encrypted)