# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0a662ca327e6f212fc246d10dbca79b8ed2f606206c8a60f052a3f4422a4465f
Pseudo Output
34ae1a6fd5862a7d5dcc858542441c1b5aee80237bdb4f007ffceb34b22b0b40
Key Image
a8d420447ea96f3c5befe7384171215b462aa6ea0b1c4e30ca69e0f3503bee0c
Pseudo Output
5ab917ad028c8717c01fc7101325b3c1ab807e3e6bef21333a7fc054ebdd446a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b417be5cab178aa3add9cc5a085b3765f7456bae51909af270d822fcced6373b
Commitment
c615227d56b7b55eed0c8efba006fc4278c4e9d0df98cfdd349711e74c637a59
Range Proof
672 bytes (Bulletproof)
Memo
fa8322ea952844821982391dd4691c4ef451bee08722dbe12d72426fed867e71295d2f8fd30848131673d4cae847f461312ff66c4cd904ef228213f013b73a22cb172b1eea1022a00c1d06c2f4b746c208153787358a9f05e2181fc4af6fbf6dab731730129dc5ac1e80ec4c0b7512a1e0c7ff822fe1dd067ad04b9a6e523215 (encrypted)
Stealth Address
70fe9dfbf5989ab6dd1294cf85da3227b487533a84162e560d10054084a7882d
Commitment
f0bfefd53eed7bda57ae7dde32bb1488222d0fafedd6725d6c444a1b6ecd0e0c
Range Proof
672 bytes (Bulletproof)
Memo
6babc602e385521620286a04980536291c9653050f0b167241884c8d610adadef96842840e7cd395aa6b61a8abfd500b194633bbca5560ae98344873daedaf4185ba9680ed9a4a6d0ba22b97938798c2f7192c6eaa1403b1f2ea692cbea102cc949630ec334191c342ae4907b3f3383fc534f850dda84cad87241f067a78006b (encrypted)