# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
60380d39ce8009a4f6cbb4805fb05aec5bb7181b8f68844ea4a6c32f8881e912
Pseudo Output
fc7d3a5f2266aa6abcffb205c6cc2fd8de1de53ed9b24b2e06c63e00d02b792d
Key Image
82bb974eb08520056c1dc73b1419c45fcd4c0b4f01cf417cc1093278dace7349
Pseudo Output
e06c78933d7ee8ee43fa1aa90c8e5581f4d219406cca1317d015c60b720fc91c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1886aae1d0a0897f6cb281e6f1054822521138e1e9b43c765f754e057204a55e
Commitment
206b9edc1cbaf25f82d5cd46a8c2f5b0cd1ed3c522dc0655ccac2c2664ec5133
Range Proof
672 bytes (Bulletproof)
Memo
deb4bb75cde44bb70c312d8a6851e7aa488bc0b563844d4205b562b7205cb9285584674c3151dad3e2ce905de433101fdff5efbf474858e4c9a0704be650d4481bb39b6d5456436fab2842cd82de228812a0cd9ae11f35b94717802f671fadf587c294a13fb13c926c66a6354c7df06c858b8f51c70795b7e166a9e0f5726d53 (encrypted)
Stealth Address
82399129d8fd3a38ad0f706326bfd0e3278ce52013632ee548a2f2c092f13b1d
Commitment
961c526a434c436b560b8f647e01818ec3db3fd281c4b82af69758bb750d0063
Range Proof
672 bytes (Bulletproof)
Memo
ad407bac8bf9b0110a20f8fe7641c2543166dfc1521f7f66f1e81ff787eea7f35a19fcf9885d3217561909ef5a6062cbe98727ac723308d457a22672c9f54c02a7f079096fb8eb0cb0a0dec459cb1dcb234697a21e570371907f589687f12e4f2a85bb77bb185a4106addc07667ab057ffe9f79a372d4168e8c760f077b97f4e (encrypted)