# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
24be96dcb68ff47e5358796f73cedae20e7a760af027637445c22fc13e23d307
Pseudo Output
945a6fe863da1f5a8033ce439c9a61caae958dfcb262ee90885b695740020b7f
Key Image
80ee98460d93355de10a969355f913ba975f19e6b3920b76637d0132948d682b
Pseudo Output
3cfb01ea89963a7d0df6bc98bdb34b3b66d75e7e1239a2c413aa5496dd62ba3c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
92ae9d30997fa51c810f2a5ccb5c1ca138ae278f6fcc95fd3e42b37fbeb6977c
Commitment
b2c3d983811aecf773a96e8259a9b0016dddd9f244ee05996868bd500fc2990a
Range Proof
672 bytes (Bulletproof)
Memo
75f8738a819d2a16a778aa17613a6970d530f783c07152fd2bbd2b1459a0c823a17d2ccb9d4220f5948013dce07ce938fe8b0b4463b521b9462c25eed325fd49d46b7f899911c45342efc4e36293707afedf9e651ae32a770eb3d2dcaa998824eee962d94483122d6ed83fd459315a880a46dbc364ae788e6c7f5730dd51406c (encrypted)
Stealth Address
ae0a8ac66258267fd86a201c2bc938c303ba5cacc6ba90633be9e42550514d08
Commitment
e2ce76a234ba3472fa75787c2c25f30442b2e8fb46fc2b2b7323965439f6f00d
Range Proof
672 bytes (Bulletproof)
Memo
5e33e4f188359aee0cf3876913e501ad08f572aee3cf261adbb2c295e1477190e2fa1bd4d0a719a457ecbf3dbe058107f7f25e16edfb0430d337879089169621fd1339339e8d51aaad5a041f42ac4f5f57ff2fdf4aadfb65f21232c93feef44ead03bad6e11e729df3da7f22f17b45c5ce2df25ad05e4c027f4fc433b74ce095 (encrypted)