# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a0a7cb6fae8bec14ef20148e98455e83683f749e9ea1f5a4ea1a5e1d905d477f
Pseudo Output
9c507af8a79d13eb226959d1428e301a30058a7488f0bd62ec8f257c7e643c0a
Key Image
e8b64341034203cf79e39a4fad879e421034d7b91fb6b7494c288ba5bbce213b
Pseudo Output
1cb5bb1274b8b63263119a8aa903828b7d32b685f6fb82c51dc5439200c6f408
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6a7c58880d19d7a85b5b4a72b3b2d5969f8f4b9981c01a79d4de2ab7f41c9d22
Commitment
58386a122eab292bd83c700e40297cc24b2fa28f64b58fb89a63f1d3eb4a9a32
Range Proof
672 bytes (Bulletproof)
Memo
897611950cc985d6ea7dc6f0b3819fa26fb2a3ee4ec575d36c8f13be008837e0a8b3ce2563bb298727439c4d90363e728975faec9cbbeea03b33b4b470f874783dc34bd8ef3ede307c1d6e0d184dced213b34db62ca20fedf7796d4501091e060271e91845cb72666102a3fea7c54424765bd7b2ccc4dd0ea4be00fb8436212e (encrypted)
Stealth Address
f693f80c73a2417faccad28e760d5c530a4df5337d0a0c9ea331a7a9f8888b06
Commitment
e4c67ba009bd8e43778a456ab15ea9204222bd04756e2e94f2024468203fa314
Range Proof
672 bytes (Bulletproof)
Memo
c3f863d2b11c7b744ae0b5f6b5a3060e336b50ae7d586798d58e8a65cca2525d5e4aa08ccb3b2507f68ed38d7e1a6a6665db67a563dac3233f5f42cc97112cd27038a5a48fee457c68a8fdd485d5db1dca6c1d45f0a3ab2cae515eecdb268812e6070858170c416021da01b9b3e65a08668ad2e09164178050ba3e52edc6a5a0 (encrypted)