# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4442b3e86dfa628a3af9fa4f221ee8f23af6e4e1b3036591662a5d954b2c3f4d
Pseudo Output
a63518daf0abcbb2f8bbee679bd31feb7085b217347e5f2f6307208f41b64673
Key Image
d2b92193e46c06e5957ef816baecc3e8a14e4eb593ba9b89e3ab2e8f8cd6e070
Pseudo Output
747614a4d72856947b0aa7713d2181c1259911de706483fd3b7041bf0d20b37c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6c949dcd62da2d3dcae9d6b8ff5e7718a206d96079093b0932fdc7662c5c5f09
Commitment
f2549a0e3134d8cd6b3535a8f900b832c4ca71832e912b7d869f08ef80cdef08
Range Proof
672 bytes (Bulletproof)
Memo
477db05c712e277204f8692ab7931c93641c20fa2f287a44f71b2faa6746b9b5a1f00a41113173e9943d364e1340c6ff1843829688de1b83b87ddb20c772bf19750ec381e762305971042ccb177d76ed4ae75a3a3c444f031c9bc4b500403a106bfca2af60c5728053fd59edcd66b1d91f49c0627b07dbbc3003e5799a2ace74 (encrypted)
Stealth Address
aa69b212b3b47aaa49d68ed921ff17f3214a57852b3a909497900d9726a0fd20
Commitment
96b7413e75f325c581d776c7ba573905e6908f6def4a6b961e64d8144ca4ea01
Range Proof
672 bytes (Bulletproof)
Memo
96cfe642b7979f0022df0b78b4e7b69cb38794c8ff37dae101f4727dcdde31c33a5904f0a26055370f97188118b416484e21852126c12655a86abef231f49c278d4b6d339bd99a84c0280dfffb6b74433cbd77c3456b27c18c23f42c5042187fcd1c61f806d1017cfa956745b46b18e94950cc66ea83d465aba39143ff702535 (encrypted)