# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0068ee763a4afa9cb21a6e053d40cfedaf8feb1bd4c24e264890413c5c191166
Pseudo Output
8aa2985aa154e73eb6a6e6d2b15f49654f475ca224e76d2dd7c00c236cdf994a
Key Image
1889bfc66e180f3e105dc972ec5bf466fdd51c0503539c46714d232ffdfe3b35
Pseudo Output
b010598fa9fe203c03614d71f5cd17e190d274ef236a5aa10250db75a0359e62
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6ab652019d109eeb57b72d800db3027159b8eed7b8c427b7550a952d217c9f40
Commitment
d8f5fbefa80b868d1b09cae676791758266582fe64c66da74d4ff93f58074733
Range Proof
672 bytes (Bulletproof)
Memo
e14f256640bb3425d10b155c2d1a324cd0678e0ecaa5cdc58990ad798b1473ac4dcc4f99aeb8322154924a7d2bcdf22849898e2326a9f6c1463fbd451a6c798dc14457800355b13770a3b73dd8cce3413a48486f1f8af623e6f1d43f9d218f6d1b6f0a8f9dc83547a6d735ca4c4465dfd29cf92e2dc209d83aa2dc762c961587 (encrypted)
Stealth Address
7834bfbe4869c2ce235fe27ce7481ca0b4e9b043f06a16e85a478df5abfbb656
Commitment
1e37c60d35813c8e6c6d8183f2b670b418388de0f4e0b77001f1e884eeabd574
Range Proof
672 bytes (Bulletproof)
Memo
7e4dbf1a5104a89f73e15205734ff3b181c77a8e97a512258587ce05ceed9c90b9387ba74b8b783990506301dffca6eb91d4e769b483d8ad84d7659f9fa7e565c7ea9716538ddea14a4025264d474ce1b89ef3d56631e7830004a1467caf2898cd6bb51d174167c89ef3699c692c5dd74f7ae8ad95eb5f45467e94748c257124 (encrypted)