# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8e7d37f2c27acc0b3b6fbf09d183b3d63936551df1f5efc5acc13d6efbc7f976
Pseudo Output
b8042b59dfc04d57f0406adcadc1c6de905bd7edf306a8ffbf4b49f1a41dd258
Key Image
f8a6ba112a375ba3d74490a7cdc9f6b3c3bba52a763901e4e0a33c536521b624
Pseudo Output
f4b9762b25e77a944c4ed575e715fe1350fa7aa1753c8a5edcad2066ea75300c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8454dfa45f908938942e803b9effbd9f53839e3e84598b6ab8f0dbd36848e47c
Commitment
f636c11c92b6bca246c834657c46fae7c91cbbc1cacf2848427542f545995a61
Range Proof
672 bytes (Bulletproof)
Memo
7e9b0e4810c3d296aa6a0924cb9465b046b3973337f9bc722fa1c4ff104fdae4704b44d552b448cb777755a118de9cafa7109bcbdd3d86302d25ad02e07f7a655f434fda8f0f9eae78a624c191e63ee7b9ba3d70a20fc25179316f72790d2e490795321000f887ae20027f2efead07ccbcb5765bfb3dfaa2586110f80cf7e842 (encrypted)
Stealth Address
e6f61f17952ce9e8870b33fd015349afb959f41738f9167ae3827fc268073158
Commitment
22a1a51f16b704580e22fc4b4bbe7e189b84a138f8c2c485b01c2b114d3c8a29
Range Proof
672 bytes (Bulletproof)
Memo
7f2333e0cb33a6cd6d276aea7b0e52bf83c450edf295c7e9db4dadb326a94d41efb3611c52eb125f394b097f1fc7fffd0205d9b67940e41d03c141c57077ad7bb7122e3e8ee82543cead9deb923004c93fb1b4ce469aeebe7e34e76d8275bb49455b3009d05202fb63300583464007417cd57a314018805154da7d2d7f60b58e (encrypted)