# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7ebf039c6ad5a0e7c98818a3e66a743f5f407581d92ce2b39239b3823d0dec19
Pseudo Output
c8c86670ee78880c029b1eaf42991cfc413655b7635ce8662d6d370cf123505e
Key Image
5831b74c00dc5e569dc28d7f49194a2abe9a2673b9194e402799cedb5411d07a
Pseudo Output
32c7b2916a4184a52f238abc6a2499c13651a8fe48b2b3491e511de30e6d7b0a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
384dac3a0d8c991c43785bfb3851e61b16c94d125135dc0c04bf3093c5439f72
Commitment
fc04d401dbedc73c158612318ee0b18bc186762e50976ff1f5404bc5206ac06b
Range Proof
672 bytes (Bulletproof)
Memo
7ac74b6d0a8dcfeb0c766180eaf891a290aecb807bcf685d7465a5fd51e2ceb9ecaed867ad653710983206ab5f0670a54c62763807a63f4de824b2d7898d4f6747b99aaf9d037d3aa11467ad13149d0825de9fcaeed0f470f6bdac499bbf88178512b2b87bb68374c54e31ff1f0452cc542f913834ceac033b9871ded4a09513 (encrypted)
Stealth Address
e8895a58ba68be18330d38691b52a99cf64ff89267c1ea6ea65a390a6f4cab41
Commitment
0ee624f22f07123de351775adecdc1176e575ddd59596575d005fe0786a65c64
Range Proof
672 bytes (Bulletproof)
Memo
2e825aaf8b542614b74c53c8b1bec85a13cfbe503c66f9b7840b2ecd639a87daa84190c0e7265b806b6dcd5561e9343beca3954aa73af7b7252a451d081ee836361494e6ec4bcc3b9f8ea3553c72507e0a925365925dc3df9d14ccadf954c44acb30348ec4f9f83f332bea601c696bd1ca042864c735bd44fb15981a66f54018 (encrypted)