# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d609d0f37df9956a12a6fcaf7d31e5dec17044e96a1aabbeb8ad45437ec2234f
Pseudo Output
9471f32e873971345fecc9ba9a43a82b7ea6ac2383c9ccb9f8aaa3c76922672d
Key Image
c283628f4471155391afe3cfc0db6e2eb6bdee876d22a3869d70cde97eda0460
Pseudo Output
16a70ce9e48a9c54e28b00a79a855b3803124bab07c992613156b06dd869495b
Key Image
66a14ab8853b97207f1eef121b8a81a49e8fdc1ef5984f69a8b8f3348b9f7948
Pseudo Output
bc39e96837ccdf76b968714807564381e67c98f0f09ac6ce6f88127320576053
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f4df060470afe4313bfd8e4e7bb7d0d20db4793e2dcd533c577e98855c3cd216
Commitment
dab165c280fdbc369085562e2634758a4a1375eb7b301d212b47085fbba24355
Range Proof
672 bytes (Bulletproof)
Memo
0fdb0908d2e6224c58b9a4831dd2e59a85bf1c422e9178145d81a351cb9b254f0798a8e11cc2debfb2c43a265edc8f738dbe22bfc9bcc000eb419a72bae44cffe48f33a783870eeffcea98af878d257e05b659d0c9ccee277d398d904a906d991123b06f509db5dbe55922e81f1d39c75ed8693a221fc1d483920804ea61e315 (encrypted)
Stealth Address
ac52ff0fe9d61450cb85f0279ab2276e9918f44ff9b0ffaa3b0c52e3432b062e
Commitment
3a15efe357edba16266982d9d045c6e215a35f6c669142efdde8a13aa47f3979
Range Proof
672 bytes (Bulletproof)
Memo
763bc426aa3b6a0e8b198915d834ac475412c02e43b6068253a440420006eb417cf5a53b72389284409c3ef614d0e51343ff01f276953fe37716c192b0dc22cd3336291266c3a75255b0c0ebace94512545d7b4ebd922d4f3e40a358acae7930c147480a953f74650cd3a640695241d4da813ad6ee130da85bbef45062261f44 (encrypted)