# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
00dd5e1d66f348674c7795a82f0b899eed691770a63d3f05f909d1e333f4886a
Pseudo Output
568fb465c00d26edaf264eb67bf70d7b4629e7d0d2a59a0534feedcd561b6e65
Key Image
5eac36b7cce41670f2fb16068ea9547ce421e8980c68f5eaf998e232434b9612
Pseudo Output
e87677a8ee621cf069fa316a703ba549855544da4eb5314f2c248f8c7ad4c00c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a44a0626e712efebe36690a3a8fec07d22229319c87535ff026fe6ec195a3926
Commitment
3c2ab0f33bde6a5729ebf9b34025b3b3fd5a6ca8eff75b3a1aa581f919007a7a
Range Proof
672 bytes (Bulletproof)
Memo
422dcabf7c08ad20463b11dfb43c6bcf4f0c688d98260b74a7b0cfe6fd4aa70a2e0890d5924e69f6cb73568d42a4ade45c6d7a98ce39623222c0a605679a734626398205067dc9cdce2135a2c2e0212adb4fec9d637488abd0eb48e8b01670c7ea9e593b17fd12326231ec97220ff2b10bbe1768e78a4b082a44a63b4701c562 (encrypted)
Stealth Address
aac0000216d019b68e04874fc81352f63de63bccee2d792f731e35b0864c7c18
Commitment
823a493eb52ba3c4929da20ab6a3d3e7a176f41fd1f2b57b4d1663c196a3c36f
Range Proof
672 bytes (Bulletproof)
Memo
1a5a33d2036e1c51cabf80e475f3920b63ec4daaa747066f3be4d2a11b328b3c95ce0f32c6dc18f737926298cf11f62859d0a2209dd17a0b07707f82b8dd3b5dda4e08c3eb267312d2ffb0ddd1d71f57a2bd99fc9ba15c6acedbef2587f0e025dc3bbec477fe3b0236a03248c62003af7533bf21f36594abe93d9262fb4b0020 (encrypted)