# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e4782e9c1058a9f31cac2d0b84333eaa772e713ed11d36d714a1a8d9d627e06a
Pseudo Output
7cc63c0e5ea2d58c3a53486026347d6593903f86ef1738e71c1d5b1e4f65426d
Key Image
94a73c1b378d81e3dd75bfc23294d18487b34f3b8d086bdcec97806900f5f661
Pseudo Output
1eb58f8be599338e1bb3060960281a0d46307c6a4faddc21a345d7ff86044b2a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b077268d3bb43b466015b5e6d112367d4493f6fabccce6bb7d5ae7bf2515dc4f
Commitment
861d442575b020ce6670eb6dd2a7fabe386d0ab722a1968e327c2f6ca2cd7f66
Range Proof
672 bytes (Bulletproof)
Memo
93f0cf2beb00b9f3e89e87bb5bae32ae35b311632ff47251ac2f1fc47bca258530bb808dee43fbef248419655785cab9cd6aabcd5b2b2091df58b40686310f3a115cd2ee0de440042a23304317399cd83a11e27ad284d8f4f90ca174b35487a1e3e00b2e8940c75d832802e7c29ff325464f721063496ad706835b3c0dff62e4 (encrypted)
Stealth Address
70cff80ba43da127f70ee6ecd3546ea0aa26bc509ac72df559c0c401d4994311
Commitment
eaeaf5a7f42b4d80fa4a8b8d8425c2703ad381886fb7c9a4e93298a7022f753c
Range Proof
672 bytes (Bulletproof)
Memo
895967d6cf85bcf2fba0cb704e0012e48793f3bdda8e605963b8702aaef849e5c44a5bc63edf5f16327d017f1539ab242a734024232a11de21f48e1992268b0605c65ea3f101c0b3deb2556bd31a52ac5b96578208e920b0cb421050b18fa7e29b3ca69744953041c15091d8d2bd7b4309607b6ac6a90cde0ba17105b0ac2be9 (encrypted)