# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
58c1891e9de276900dab155e3fec7f62b7e9418c452b31ca9bd38971777cc96e
Pseudo Output
3a5029ccb691f56ff44a9c4177e8c44d32742d17e577b41cb7833fe6e1bc7304
Key Image
341204fb757a13a2c2f77043f3fbeab40f88fed44cc89fb90ab992b7132e9c29
Pseudo Output
2676ca652729bde6263a1c09eb5fee049586d8737de4c5f06811738b6e6f9a57
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6e15bdede3a29405d0b93ce7cf6750e4ecd2bdaa46381f0fdbfbb75c5dab2f5c
Commitment
fcebc660accbe01bb88cceccd1a088fac6a5a6b059247391162142e80e596d42
Range Proof
672 bytes (Bulletproof)
Memo
8bae1501fd10c5f3751d7f7c09f88f1f3e15a482000acf67300689818e84586d6aa8e81b4ce98d6e8911602bbca7ab2fae8ace669cc373161ba42b54e43e3e13d6ed2bf78e51741ed710c7a73e26113cf569767c913f1d4c0f8b74cf4eff1938b14117270ce6aa2dd5df6bc70a7ea06a872bfbd5290cca0ac3c2ddb7d2cb4a29 (encrypted)
Stealth Address
ba6a8ab25921608d31e1d11616692ee799f5c9ec0674b8291aebe402a26d3b40
Commitment
e6bab05ad828d2b576a1b192be478842ed4b6841032092c88692ab9b9e45cd36
Range Proof
672 bytes (Bulletproof)
Memo
0f5cf103a840aab37019523a00a037ad3bf9082adfebe6b890922f90b3169ce7b24cfe7f77550636b5810fda54e13dbbe89ed8b86185831a7183f9630593071d8be9da0e008d87e34ede496c49af16dbefadbab449bc2dbe76c99ae433f7db5802ebb310952996334a7335047f93c1ab374722caf3d8ee4f14cba6d06dfbfbd9 (encrypted)