# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ec4919b8d8cce90cbecef2edd19c97a6d6ff75ddd8f9bdf4ba3d0a72f52aa052
Pseudo Output
5eeeea5bde5a7e88f33657e14b5fc7b613107b5a62d217286be3154f623d3f11
Key Image
e407ea9f4e345caf1b1d5962aebbcda67ff2187186697cf079183512eb1fd02a
Pseudo Output
7261ea107bbad304f6986e0fa2604cb073ea8e6331162df7b7da5119c4c2f642
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
187d38b34e996f3f69b3ef0005beb6593f0445549e03f3cd72cc32904d69af40
Commitment
608023f41dc7fa9fa7dedeb00462a4fc3aa15f1317fb4e06023ea8d36be95154
Range Proof
672 bytes (Bulletproof)
Memo
44aff6ba54d0954f1b2c1113d3603203ee55597552f1513f848e34263213b98953f786132518b4bad996540562f06264ebbd05bf6f5562442339f759bcfff91189a0a5c0fadfd5cf1175f5e9b14346e0a018833d602100a4645b04ccb0c2cbd990a26be175932f847c6682d62ed75866fbccf32df242b03d679d8eac01d3abe8 (encrypted)
Stealth Address
00d203dddf57afc5b0714d803ef82446d22e7281946c0ede17a8bae326c52d6d
Commitment
7c0dd22de61c9fab3c9c33119a9522ac6b2e1500590413c95b3ae8deac8f6f11
Range Proof
672 bytes (Bulletproof)
Memo
248bd74d7e534389b0c5436dd769a64b0506ef3a7a6157c09ff38dae0e039d2fa63e2e23082b8e2bc195e8a4d22884ea41b0cca8f0286fd345777dfc7b14d80c47ace975e75ce26e987e2da5c752af9304e89bdd1a9b2c3e4a13745c271242200a08f41c52b5311d4f41daa4ec299af5f86e28fd96a8741abad6661a49883969 (encrypted)