# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
eaedeb25b2210e469ed15507c09ace9d1311362672fbeb5387e79ba1b5ef3601
Pseudo Output
ac0bc99e6fc83e35761f61b953d16ac7d4a3575d3b71d9ca24160fbd21605f3e
Key Image
528399060ce25df34854d4ebf29c3d77f6457bdbc78ee204dce4be8800ef060a
Pseudo Output
a614f395b270d3e2acaa6dec1266bd2e09651160d8bba9cf04c0372e086e0153
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
dc97866df12768c8302125c12a42e12a57a3fbc3634c0dd215b58b6c19823664
Commitment
76c3b7e2db0644f3042eca748ede4e205a7380877ee9a1a63d8620d8de594b7e
Range Proof
672 bytes (Bulletproof)
Memo
3cbb68185927e4dc5de42a27149178894d2c1e3f1f172a3cfb797d2d20bf3427c0151c1c1dacd2f2619e82cbf4a503e3597180e4bfeb7a4df6d551f8b36c2fc2b4a278686dbbc5fc455b213b4df216f86efb1cc94da1c629225c5731b5885cbeb62b91ee09be3e404b0d5d680e2b69ab08c14d0cb6a2545dfb4380a4be0a0518 (encrypted)
Stealth Address
3495bee07c5e377c11efa799d089bfe77540468c094b8dd30954187525d2a660
Commitment
5631c2e23cab3236952ab8418bad89d7adac28895c503c4e6700e6bdacf3441f
Range Proof
672 bytes (Bulletproof)
Memo
4f8dd03d5267b211d31ec1fee04bcf834e52f76569e98f94176fdbe50d20ac37e744531934425af9233888a1535f79f82685f96fcde8c8d81a027acfede40cba6817cf656affeba26de11ec91ace6c70340f22fec526691c1021d25e312aee4b1213e72addbecc767a5efc4db1b8d20e89c0c4d67331dd978e0f429c2476bf27 (encrypted)