# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
36e430b74f3f25f4cd409cc3cf9e0542ce4a1cfbd2fdaea5c7a0c27a817fa72e
Pseudo Output
06e046bf3c1c2f2d7b64a195b1afd31eeab6a617e361365bbda52984ea920551
Key Image
bab76ff6c0b212e17bad34d5c52482ed157c369eb55678f6ce3beab82250173c
Pseudo Output
ca574737bba9a5450950f1765661873844fdae8c5ac0b1da015f4a18428a0f52
Key Image
f22a6a2beab3c749ec19dca5fd2fa2f7645469aaf20043dc2842dc3e7e50f664
Pseudo Output
aaba63b698867eefc37aab43e218bb79b40c468935e3c26dbec0c6268b23df50
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
4e1aa1346584d127af81633a2caed9ba9228aecacabd65f4ea570b8490dfc570
Commitment
f05fe5704293dc74093bbb691d429f032a9808a23176bab6ccb796a641120d7b
Range Proof
672 bytes (Bulletproof)
Memo
8320c8e63617c3d3425312633dbbe663e08657ac6cbb551c3deeb7dbb636dd2716f17ddf1aded59874b6c6d0faf0a2f74f7d18d9a7514f5bcb425255edf723b0e20ecaf3b5234011ead1c42d89321a170e018197bc3380008eee69fd18c41e1fa8d585c30f17b884cc7321152ab6b1c573277df91722f563b494a30f4dc137ad (encrypted)
Stealth Address
aef0612c17838818f8ac6fedde18dcb9c90ec453fad945efd06f4c024c61dc60
Commitment
9c62a3b15b2688525a472d0783ea346917a78b30733b901dec6406b230f6b947
Range Proof
672 bytes (Bulletproof)
Memo
f771622008553ce8e3df168529b4bbb37f998adea0bded800a26c26b7e6e9c8b4ce1a9c1ee7f48784c9840eff7c7764887dc1542581fc8b6413cfec3eaeac68d2c5573463625d1f38b28af323476ae24cabbee8614d14a0efa9e238e48ff80968167b407461c67daae31b76342ff3103efd6b290bb90c553184976e9c5ee818c (encrypted)