# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
86c3a93787809ab62ecd86a75eb5802ff86d5304b5738c52a176d2bb2db5d160
Pseudo Output
9897d878e39ed1eadafb1554e44fc48b2c6fb1983d3074fff52996fc98c62a44
Key Image
2ca4c5f78436c6cf61e9f7406fe316b1653d0674ec30e5370dbeef8521ea780d
Pseudo Output
f84f1d1edbe46c97c008488bed0270f055d32e83d9728b0f881b0b62291e863a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c48ea21590fcc86271f16bd573cf05b494add819e8bd6e5ff44e680e089a9736
Commitment
e8854c8994787e19a4924aff8ad8cae052c4e1b4967933bed690adcade193b44
Range Proof
672 bytes (Bulletproof)
Memo
f7e46bb1516a7b806ea0292f45a94e6850100064ae82f9ee83a001b037a5979abfde73d5f836524e0eec4955afa0d53fb89baef056e7356ee8c18772d2e1a920921c7ac1fd586e1b436d0f37d360cb2461cc4d3eec8afabf3faaaaa59a97516c61ac39160a09d0e7cba064006849298f83cb8f1fdeadfc07d95e52fb770917d5 (encrypted)
Stealth Address
d6038a1c93758f4cc42aa5978974d4165727a721350cb9354b9c61ef871d5c5b
Commitment
889e6f172f4311729578cc26d475d4d8887bcd1a2dab9c40d72df42d8a22df31
Range Proof
672 bytes (Bulletproof)
Memo
2d69adb37773ee3058ca0c46b471668355e3591815de594cccde13009cca5928e0fdd2287a45f41ae7e9cfa03ff5808863b6ad1b1d9147a06f376da944185a8e6e62ba4d2acb7e0eace0edbd1844225c5e954144fd90c4e444e185791d71676c0a883324fecbb53c57e322c4483749dc8671311b0ca474a29f5aaa2f511ff47e (encrypted)