# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3cfb51b80b8e767d2bc6fdc1e9475975330d2078bfdb8f22fa6c2ba5e275df69
Pseudo Output
64ee2edcfea98a9786fbfe1dd542d9a6b5cc05836263e842de563961312bbc04
Key Image
06d5c7d7659b4e5ac94c6866b7e39398337658b11eb80abfcad309c896259776
Pseudo Output
4ed21162013e4e4918c14d05d9cc5be182c941dd035bacdd19e8a047d0322529
Key Image
e28a0820241ab28e3d5a095bfe4ef2555d0f490293fc207be0af071d6909573e
Pseudo Output
8a22b111dc448ffe98e0a846376ef52bc9f409220250f8911164cd0d9b0df855
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a0ee847fc7c6408e6104d66d89e51808fba40b56d1afcb699a2781b410dd8651
Commitment
32531f4cab87782148e65dfccc81b6f0dacac5d3e3580ccb9695016ece795b32
Range Proof
672 bytes (Bulletproof)
Memo
8f475311634f1bc14024427e9641319f4fc23b4ea2389a22fee5fd256719b107e61aa0f7186be43a831898848b47ff7e39988ee5fe847062840c5feea85371bf031f17754db06b87d6b2e01d86af8940e5b97081828087b8897e0416ce8e2dc7798461101c3fda04557ee973fbc8515c764644a19c73ca3b16d62d6ec0f99887 (encrypted)
Stealth Address
e28144d561b1606b4f311951a18a2fa86005665719310b5789fe5ea17075b104
Commitment
ea70862f6c622b78b6824b4ea4fe05bb7b81cb388d358345a5edeeefd395b350
Range Proof
672 bytes (Bulletproof)
Memo
8229f7c9f7c5b826517b0d9e0e3c9fdfaf61ff507fa00cd7b86fcee82c9946a0969ccc6c1fb1a7d73089152c39f1c9b229b40fcd0efb52ba59fe8011cb6ba1dea87a639cbc38d5f8e665387807fb19c85d2d7fc5b585021f8016991bb4f0dd9b53b83ab330bb0421026086ff029a0914d410832f66d4292aeb8930f40d9b4770 (encrypted)