# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a6e88a0a5cf89ada6d8e455fcd702493d0db11a80a24f4ca8f7237459dfc3c35
Pseudo Output
7c932bbcacc7874fc04288ee4a478a4f04cbc44ecdc4b06161eb573bcc3cd666
Key Image
98679e8b733adab24b68a8ef6e322c5a1726f842226877b2fba45e20d7b53a2b
Pseudo Output
fa619727f68abaca51f524e384809e0100a12958f325450c96b43af759055e4e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9464bff4695d55557f97ad4aa8625c603e646da362e59de5eb9c16b8acb2050e
Commitment
c25ec36906ccd8eec1226fc49d3e45e46e3aa44529e090b60eb8f5a58877f064
Range Proof
672 bytes (Bulletproof)
Memo
e3df9b996ff6bd1bb67147234b6abce51889123f6d364effad5c8c77dcfc38aa3d72ee33b351f89127335e5a8aa1000ecee297a46b225e151f13067a09e0c46e1b31b15266b25041ac86fd6de1b1a13eb383c0a2f377ed34b57218406af9b9876babf70838a99fceaf98ba22f07e10bc63451926e876afaf0b891d06a99643c0 (encrypted)
Stealth Address
5e9389a9972116e429ec673e2b1cc61a8d129fd368d80925fbc07eb237687938
Commitment
b28ca3a98d661623949680bbf9f053461249e7ed5087e420f796e38f5469210b
Range Proof
672 bytes (Bulletproof)
Memo
3e978a47ca438d6e1af0d1a270e85395d14476e73ca60e05c3385801644a75126426459c38fc17018b2d110710b49ac829ee012f9017cb964fdcaf302fa2a38698aa51bdf5c9ec5a72b1b18d4745a27dc7f21d1842669d457b50e416755cf14eac097725fad133b24aacdc756816d02a289145f106f4a824a93df89ef78f69eb (encrypted)