# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
96764d17a19689cf0f8e0ee281b57d664b21653b9c04429f7197b9853464921a
Pseudo Output
a08b9e484aa43730032c8d69063d8801cfa507ad25ea981c7a73edbe2fff0575
Key Image
b497eed4464cc59574a3b5788b8f48ac7e07ab0a762faf1df9d0e867578adb3b
Pseudo Output
e4626c4db5e3e41b88f559031be923862455b3a7ebf6f70e7387aefa987f8d77
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3e3845c2d8983cdbd6f8e52af1d78fc73179f5d6881f0d89d66c5ab44d0d5b5a
Commitment
96b1e4f5f188ba03d1094d6f312621e17d6ac2fdfd2e66d67c1ed7e87c7d0a4e
Range Proof
672 bytes (Bulletproof)
Memo
c941f15b3a5d180ef9d6c794b7fd811b48611645e7f494fa0d9b79a487b0233efa6610b21aeed8de5fac341906162c30b4f2bd20c369b8d3ca056e1e3ade99444db2c49785afedbfd298d3001a75ac6f2d2c51a7eb893503c8d1a3a3e32a9f98afbfa3a5ed6bad4f9d949757afafd4dd2047d98851807ebca443466015691a8d (encrypted)
Stealth Address
a893fdeaf30147379027a172d36606eb38c96406e00e56f5330154861553bf65
Commitment
6cdb122d309e766881cd576889548db56d65d946bd665fa05f53e257b0253d2e
Range Proof
672 bytes (Bulletproof)
Memo
ccccf20ed28cc43b72e90725ad7fa52a31364f7e28d4360bac8f454695f73884c35d9ddf6d71665b42e485a81bdfaedd6259173d1b85aa2378d45c9c3cd22aedfe4b6f3fbcb414b19d81278c577632cc4a5f6314838ece6a722f86f6eae55be586280cfbaee93b2f3c68dd81fd0b3bfd6f64903d966a6f862cfcdcd2e3f570b3 (encrypted)