# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ba772a5c479b38e2033e728a95c249095177d4b5284543c7eab821fed4f9c914
Pseudo Output
f80e75faacf3eb736068115dbd41beed379b5665144214cd1ceefb4b4671bf75
Key Image
a62599b985728249ae7742428437d3c1ada8668bcf01b51ba304ad7ca5973416
Pseudo Output
d6bd4668462c158c1f9c6201e34d8c7d655bc68d71eafca655e8cdfef1fe3941
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0ad99c63c67ef36b06233a4864425b5d794e59d91280ea46fb9f2598a4a81333
Commitment
267eacfe4afcfe2db7abf839320b63bee444af1759d21313303872850d551f4e
Range Proof
672 bytes (Bulletproof)
Memo
465959607356893bb91dcc1359f4d3ad256ef95ddf9155f0178644bb50d3368077bc103e1f8463cecc90dfa7d00f47273f7918abd9e27f33e342a5cdeba60261cf300e0246d0bd275577b0914b38db807767d9127f50662cd5889cbec08091bb7561fc69c86a762da4dc922aecdfcac0dbf3d1374d2d71e790ef2d32dee56b81 (encrypted)
Stealth Address
441702ef96b46e9332184a8a11f168ec7e63d187de2eca885c733447a34f0434
Commitment
98df20bcc2fa1c445cb2bbaf5cc30423bb8b6c92c4008c6d99d7d5ec7eede906
Range Proof
672 bytes (Bulletproof)
Memo
18d8da24a00e6f99b74e8ed601f827b1073549af46157bb48f7a6f766c8c651f708ca7c66018894fd448cdb35a3d943a0c6c7bdfbc84174176002108e7781d43240eca05b2e67aca89c4a7a381cec7ab86ef610dfd8a813d7980c952cfe625caa9b6bb00d9d033ade923597143cd9b0f0aa0f0ae1aa34aba6a3b222a4e454fea (encrypted)