# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fa028b995ba3627e8a9fcc2df2bb059bf08b33967f7ffe2d6c53d62fbe428b2e
Pseudo Output
8ea087dd7b671c078d6790f585933b53e9dc423d9a67ebf9be03c1cbf8dda253
Key Image
50f7612095df4af1f9ffe0285e2925a9b6ab34ec40ab067b1b57d115c5c7130a
Pseudo Output
ec4650b727f532e2bc78cf347abc5a73f72b266e50739cad73a4446d0ea8cf37
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8ebd02a0a2046ecfe98f333ed173c4fb950c783747b08fa63619bcce4f7efc01
Commitment
fee12bc9fedc2b34dcbdfe9726b7cdf3ab227720ace639231379ddf6b7d8ae3c
Range Proof
672 bytes (Bulletproof)
Memo
6ee3cbc49f3740e5c63d53608f537b4b5a3187f4209677ec0e5d391d97cb0bf4f76669f9d2a78fb8b6e37de1424c6f4e15f5fb8d40f39dba62725b734d1ccf1b419d512295ef3e86f0b17c0f31e616cbc970f2f9481c68047c1cc7da00eab1c2a57235a113b89b4d86290891280ed60307bf81499e04dea013e15dfd66f47dc0 (encrypted)
Stealth Address
00a2a3932e67770e7902704a4fe4c7bd87c7a401719d3150642e3e3f26b07d3b
Commitment
9819c3cdf55019ce685f2682bef24bdec00d56fcf5e68ef899e2d67e9b03c25a
Range Proof
672 bytes (Bulletproof)
Memo
7d94b95556d1d3c85da77a1ac27734196e1f0b135b9566a137fe4208da92ca9c5e6ddf9d41b15fdae9104fa78abfe791e6d0fc1ab32fe39788817c5c4341b6106a6c0d4e6d025df80d8e8053224d0111e89ece77f2077ade48e9161546488293a0f17a4d9d27e5a6a53072dd57bb5f0d004a73e6af742df6fb2619704a126c9b (encrypted)