# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
64fa940a0376566904661c14e7815e6e0a4db95daae1a14a85300b6db82bb978
Pseudo Output
68892dd068ebebe3bca76a5a1523bbc030e371ccc5047004afd9b9e36a0a7b5f
Key Image
d6cbf32692508d8e48b9bf9660b4facab4ea5ec542fcf9f07ba9504376508643
Pseudo Output
7e63d9c644737cf5a47e3d80cc3cc4bade0a70e25ddee6d7375cef629485f346
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7ce45c52ecc4f95f365be759f713de71c711d707b75a975c31b3eb03d81e4c30
Commitment
38210e1ebb6276bc3fbc8079d51b7a34b20e2ab801c599f9b143364b8dcda178
Range Proof
672 bytes (Bulletproof)
Memo
609299a6ff4a5ce86681e11dc04680890fac57052fea1e39587576048f5c0a0e5bb1f8c1132ea61299c0ac901ce1c20b436a3a5c7d1ffc71fae96911e19e2ab6ff35152bab9579909b699035973bbf76fe7fd233113437b0f31447f60f9601dccb452160c5a500bd3b18334a084e2030faf80e881b75bd2915d5027e51a656dd (encrypted)
Stealth Address
a6d1b0f0eec14e8020624fb083a0bac5ddfa985ef755d4184ef01167cde64314
Commitment
eec1e69821be4014e6a789bddc9529e881fc736419e250c6c2aa34f47cac6046
Range Proof
672 bytes (Bulletproof)
Memo
13fa7f1f1a19f5b4017851facb6bcfe3c2af70590461229677d5ac55298c43af51c1c956ee3c0ea93973f8d2ac38417f9317ff7a078762980b2908432b93ce048b7b8e469f3791860ed57d0340f01e0e197b695a67080c976068a8b8c19653291b2cd541b1ce6f5389b72d66cf8f3f85b47e7958e061f80db6157a7666b4c8e6 (encrypted)