# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
563244a44cac6f8f37ff7a2ac688506c63aed1eb127fa8d35ce1463dfcee2829
Pseudo Output
9c73ee950904138bb8bd2b67e1e7bf0d942e4952cf948def30e4e295b6e92840
Key Image
f4142917cc85a3ffd0926b55291cc6fc6fdffd56dab622e218b42dce31f5791b
Pseudo Output
7aae9493f6189b8046efb426e64b9e5d234d09b7bad2af9690c2df4bff369560
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2a5fb158c386d47080653988fc7ce5e9504ee387a62b502dda179c572561371d
Commitment
ce44718a45b11cabb5a3219195786ff36bdea30cf3366f0118746bde8ec75530
Range Proof
672 bytes (Bulletproof)
Memo
0e8ef759654c6b6d0d5c1cb12f3107a90fe405ee1efea53cd127d9b60c5469803c03abc482a3bca56a276658f8e8a17169cea4be26930c1e8844a47666613e2fddb822eef99d09626aae46b2d2e16a35e72069f7855d7b2b9e6b73cd8e8531566f353c03b0305081bdb945fc0af0d6272d91923ba39a79361fe23a9a6660e7c5 (encrypted)
Stealth Address
589aebe89c97e94df3b3c24c37efd3377e8baa39fcd71264e778f258dffb1d74
Commitment
c6e9e9a78cbf41aab29a24f13fa06d5dc772b32ed495517e571932782e089f4b
Range Proof
672 bytes (Bulletproof)
Memo
74257d75c239b3ce3dae692fae1173a77d452b50eb9ec0f7fc32cbb572a45a05073d5d4e93337fb56f9bc10b10ce5f38f9c7968b01b1a50550963e82afe50961be09405bd3b117281c25d50172011b12a22a171d6d7aac2ea74db9ecc20d8633f0a2a47051afa595f30a7780953f10c27380ff3b70e787b1617e0bc71930ca31 (encrypted)