# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
44169f81a306ad32b98f93475514d9c9c6340fc35c5344cf6129230acad05d77
Pseudo Output
085a4aaaf97fc12c096c10d1c75a986a27f5d786cdf34a72ca1e1bc4a905fa6b
Key Image
0cd19453c51f17cca1c158f11132ae4b2e0b456ea3b1c08f73cfe3711a3f7c5d
Pseudo Output
f8a14340c189ab3dde82ff776a121f2b49f86e80e4f199f4b5d218386a1f6d77
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5c3ae6fe9e678f5b948f0ec80ef3e552ea41e9111d8e77a1010d8dae2c362d03
Commitment
de7223d6ddf2d96775567625460e3d70f0bb2152ab1ce92489de8ef37d6bcd0b
Range Proof
672 bytes (Bulletproof)
Memo
319c6a2012b3e9de68e0224d6be40cb670dca26d3f932df56e80288643809946fc46fd32019e578dd3d473355361b2e5f5c3cc67eaf04d45c2b0581aec32a8b49116b9495038189194a48761e41c1d54b408a53c09af815d8511c379c42cdcf6205be70458435a8a6ff5beea79b7dd6c388f737b4d68d849f3ffac42923228d9 (encrypted)
Stealth Address
1a6016cdbeff4d8afca3035a5e1ace26fab055ceb362029dd202acf484e1e144
Commitment
18ae5a15782ad7cd0e6c37c295eb0ecc6972d3e1604b0357d083567b6988262f
Range Proof
672 bytes (Bulletproof)
Memo
162a4a93e9e9aeace1be7173bb664fce32b4a3439a9a783874d70df1696187a31e4858cf9913530adc2b4d350054c168c3081f4c20fdd0c1da4329eb803d1394cfbfe88087035920a9f25de82fbbed45528820acf74250cbbf56e9a4a157d18839290ee856f9d204c3b5595b7d5349f01725787bdaa90541bfe574d9aa2c63e4 (encrypted)