# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8896bc321ca9212533179648eb44e0efbd06297d7fc90b050a414703e991d81c
Pseudo Output
062a30b88185fd77b56698bfd917ab56173d2965b2b8f25467ce6b38e5a5557a
Key Image
269ace3e39b2614a0fcb2f8fe35d39399e8b086f900096f07c044dc90eed8352
Pseudo Output
fc3079c072cd87848092ded1a059ea9f9afab20d17dcd732dd24af118bb9c442
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
12d1197099f12c53b1294c4083eb2d207b17daa66a48185bef9af1f102da6e2f
Commitment
1e5a191f84c15698a8fcb626ad84d59b518abcef4726fcfe6915e99680686c62
Range Proof
672 bytes (Bulletproof)
Memo
4b9c0b42fb0218dc16f23bb453bf3be34c8565a54c4a12b0995ac5f388c4e25a4453a008cf1b50344c9bfe8c460bb02dc4b6a20ca2806abbb3b9f6bcbb4fb9b12c4d564243c3eb1105de69d725d91fe9240300341ef4d60c5334bf455fef3aad4bdf91ed41ef804f92cbbc9cf29f4f57c0df02424d326f090d7d735580cc705e (encrypted)
Stealth Address
320ede9ff0fbd0418840b17e374703b1755ee70d5d7bb1c95ec679e7e8d4b148
Commitment
a2c48ca86f14fc159095c1ec8329e4ad0a21d647e85db9c0550f601536dbc321
Range Proof
672 bytes (Bulletproof)
Memo
339997d6931e8b3c585c51ae4fe917ae60b886098441eb92be0b51d5828ff0f5fe09044a91dacd7061644163b52a0d85734b75094d2daba3bed683a597dc1f9421844aff29e4f138ce7f83f8797c18945157090ec85f18e0285beaf4e36a0013d93a635718effa6457be9f9e39b49eaba39029ec2c97512692848f06fa3f1171 (encrypted)