# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6c42dffcdff6745a89ac545d8c1e5a684bc1475426defc1a7e3fe39418da5f3a
Pseudo Output
baf074d9ca6474f0ca05f1627f3c7dfcf3adff3830484d6ced6f7e9531e56a7b
Key Image
f2d793fbae6c98cc8403da5e5b6eaff8df78ef0e7fc1ac122f0a46cfcd177961
Pseudo Output
0a30676b8dbc6b8c9dc6d31bb11ffee19d58d7732ec8cf3a23df3f3119ace45a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e2ddb28a81a8884f7fe8799d71f92da161a20709f9c9c2bba8cb79e17cb9072e
Commitment
3493bcaebd4ad38a8aaea21259c7b748f17fefd5902b4717e1ef8e201aabd278
Range Proof
672 bytes (Bulletproof)
Memo
5c0c867bac2756c1d543fdaab3829158a245dc31295447c5f826efa491eab0e4aa8ab765dcf5f4d8d3a1e6e82e61f5d992b5a0bf622dcecbd97c448556672bb7e12faa75f18857c770972ed93b207fb820a7163eae5de73915c531486dc52899ccd063dc80f0f554fc89c8b47f0c1e3185e917c4c4edfdcfe1cba63f1aa95619 (encrypted)
Stealth Address
16f64616e3c1010757ed22c644f18c4394455a640e8e41fefc3131fd7f7b8159
Commitment
941b3932f04a2079a3b8db29c0fdb52b17f0a9531e05e3186932c652549b065d
Range Proof
672 bytes (Bulletproof)
Memo
d892ec166b52de27eb436b9daff558d5a7257b3c47d67147fed59bbdc013c47d60810e17ed31f1e26f9dbddec1c01129e5285fd9706133b983131fafb7346cb5f629ac9a81f879df178dcd9e2ad405b84daae2782e4fe09731a21c32b03bcc35492cb6844d2080a89942f438d0367de972cd9aa9c661ccf940ae8ecde6d837a4 (encrypted)