# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0a2da09e9a0b36328446bba589208ea34b638df5ad615f0f87b5889ea109f05a
Pseudo Output
fc1c4b40ca20e42ea0c346a6c957d5335fb637a147b4c15c2f876935c2dd335d
Key Image
96a54c8f4f4169766d379b4b89e06d614dbc6469ffce606c2c4a1f3204c5c060
Pseudo Output
469425ff8dd1bdcdf04f68b923e4180e16ed535ce175b123dd8f540d104a9717
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
18239a9f4bc1d57eea6fdca2db08d484b1d8ad2e89c1dbbfea9a06496c668057
Commitment
4adc8491d9caef724261b648e82d245f0db430e4eb9e201b410a6a109adace44
Range Proof
672 bytes (Bulletproof)
Memo
927a6eedff829a4ef53dca3c78c7d6a2fce53b34f752b79a42568ac4826b6307b57fe133612674af1ffb736e945c12500dece6c4ac308c08949c77b03691bba154e99a0c93bd658c4647f17a6cb5c5bcd95e43743738534c61654ba8372370aa6295268010813cf6db25ea610e0d82b41b8d3042e5f668b91fbc16b85eef5a63 (encrypted)
Stealth Address
4ef618ec76a45e7c7b3a312a1093e935f8b0500b8741e54c61d0c07cb3418952
Commitment
44254c8852e55e917a55a566a9f90709545427a7dd53c0b8235affddae048737
Range Proof
672 bytes (Bulletproof)
Memo
4a998fc34c5f441a2f20ab8f4b49f3f58a51453b5ce8433feab7d066dc7754d27dd30e53bce36a6eeada1ea51f86f8b152e2a4919ee6667e766ddf3880e165abdc9960e7479a0b42aed0ac851697181b33b0f031408f6facf6653ce8c6f56f67e205e237a12cc3ce9beba94707105780f725ef8cb16ca57aec92d382c9e1fedc (encrypted)