# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1ea857dd52b52f79616c30fb6437797e9e8a10974224a84b152eb7cc9836f138
Pseudo Output
6c5cdf78a859a9e218a3180c3282c0b02db400a057507d886a4402a885c15370
Key Image
b0139756ab2d5bb7dc6655d6f3c7409b1faba55250c2a1fffd31a42a0a968c12
Pseudo Output
d6f48708ffb6917137e37515b797dfa428e8d1a6bb217277bcd1701642285902
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
185567cce399b943f191730ad8a3893bb355c5a9f2fe5ca424aa4ba1bd594273
Commitment
46175188df5359417a7def879f282aa24027f4257cd19910be8eab4a43dab329
Range Proof
672 bytes (Bulletproof)
Memo
9139a8782b2e300410f1022be03193c43fadb0ecac4d9bf2ec7a0cddf48df62d95259a77728ac1227a66b5f9df92d9892b750937f30852e84f0152c60e932859e66195992cd5deae5abc3c4fccddfac12918d7e2b960c975f9d1c721d120ac33cdadc7258fdfcd4d5e095de70f5c4300a4a14b80baf65e4cc1a4ce0ac6ce9ce2 (encrypted)
Stealth Address
bebcd81978394bf460084eba0c55b71dff83ad787a76d460aa538d729c217011
Commitment
f8df1ccba697c275b36bbd3cb7524b6c2af9db88579a2ef092375c69dd4f3a57
Range Proof
672 bytes (Bulletproof)
Memo
2a6e615f20fb49d5a869163a18188565381d3e222daf094ed3d3d8d73aab3e1e002858a5b77cd930ba54f40b678748ddcd44574bed3592f6bbb6cde2e9982c915df4c49709ef8073bfd20716b4e6ad4e4e9c70273fdbc7ba667466cc6ccf9df58f654ac78b32a6247e147ad150a143cb995135e2466d670913236b9285f19b64 (encrypted)