# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1037dc47c4128f2a82638209ce8950e79f608c4250848537036bc40263a6dc0f
Pseudo Output
cae1bb9cfcd6a7e3accf95b824ba664212b9995d8c9a7e0b0469068c1e2ea314
Key Image
b6ddef0fc86e51ccb27ba18b4c40fd591fe6f795af4b1302a1e6abe565ca7776
Pseudo Output
6475bc3621b96d6a8ada5c977213fb866f7decd0212fc089d8a6dfda5c522e66
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5880a2caaa9bfc117cb1ed0bf8ed33379d51456bcdda5725fddacd021ce41b69
Commitment
b40e7b2b3d8345e30541496bd2fccd31636fb8a75e9a9f6f25e2214e0617b611
Range Proof
672 bytes (Bulletproof)
Memo
0cc0268e08851f3ca1017f7ba85df3a9bfa30044a3e3d7f50596751ce003dbfd3d1f72a3270d2efcbd976c314613953a8012d43c9f5fc1211d2438a8eeeacdffd89ac136a7035649032097873f942307a7f0ec505d6c6247c1202c0438da0b5b01e54b2bcf32d60da948d7c10f39000ca0a6ae3922f3d1aac80e6bded509eb40 (encrypted)
Stealth Address
04e55c492c5650550a695a29e7f7b682f0b3a8abcee21992031c9e690b75ca7b
Commitment
8c1c279a422c74b01bd302fed91bc9449a98e3dd5b3fbaf617656b68cf83185a
Range Proof
672 bytes (Bulletproof)
Memo
d9ac24b9e023460a6b88fb51d0b684b7683f086adf60b3bc35af5841bd641d438dce4b4926fd555dd958045598464400a2c89b5768ad7d3b0f5a47cf8fe4b9f80d9f13f6603396197da5ed5d1c5acf779e85b52b4f3b3d9dd82f3c59b506c74ed996c57f268b96d02e1e6d8514c150f8e6832feaef0aa605fe9b07cff750eeb1 (encrypted)