# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e23caa58badd4e5a83e0844d5646baea5603626354b015c87d83c4d6e838555b
Pseudo Output
1eb92d54c157d207eb2ee49d6f6a2ae3a2b24f21b79460006ba3a6410c07a968
Key Image
a442262e0425820b468dc1f1f1415182e2c2696e43d38a6ccb734698d5189918
Pseudo Output
185bff6255bed7b28108294495e3d587ec18740b29ef6d46ee44f0d062875034
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9a705d60248f7c6d57c01833757c961bf2b4faa5b450bfd9c9d3ddae6ae25372
Commitment
3e99f3fdf92e05cc22694f4244865efe449c5759494f5df60afcf5686b8e0609
Range Proof
672 bytes (Bulletproof)
Memo
0b102640b112dbc349a8e3de944de5a9db5078ad61e9c9a57b7e5acf9a6694fc6a874ec040cc329386e4b067daca78ecdf6f742885ffc0425aa38436f9e16dd4fe9f6b0f1d8ecb7314659b95dc5dd26897d6a85fd3a3a69c430f412da59939083be2f0098208d434bb3dc2301ca230cec4f0117f9f4f65440d37ec339f400440 (encrypted)
Stealth Address
449ddbde8016917ae7538afed56876c053873fb99e4149ab88777a9a1ff00b38
Commitment
70d50129a747904d2cdb03796e8767263313d0b12d2651ebe7545a21eb59781d
Range Proof
672 bytes (Bulletproof)
Memo
4b45530ca3dbd166de72d1c2b4fc2fa22b91cf4a34b9c2f625a672a7b9ff00b7a5e08c2bda02827d63702038aa4d62de84c3d429604e3b3f3fe09a3b9346fae0c67a7f37e43e34b17f0a7bfc014e7dfc3ad47fca05ea50a05199c458e3afd6e4f8c3f35fa42d2a612696fe9be6135643fa3713f12a5121ea1a2dd04d6c8ea7ba (encrypted)