# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
28d1e3ba7876d72e5d5f3ace58d4e0d74e5569dd774f46e1b6bf82d295cd0c5b
Pseudo Output
e87a0445d58b761794e665d5ebba8b9155feee31ebe1edd6a87c8e48817d2b56
Key Image
5e39a9520de101097155fefcc011e3b88806da6def002949cb00259e5251c947
Pseudo Output
28f985b282be06348f2112dc92b2ccbd408ca5cbdaf24e260646b7e8d89dec2d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0a8f159319d43d4a512399709d9974a199370a0c69d7eb4f6acc5df3ae4bd469
Commitment
f4addb77db1dd15ca9c251e81f8d7659c457cf6eace63d3af3ebb776f25f3150
Range Proof
672 bytes (Bulletproof)
Memo
0fa5068812dfac6c5eef10f14721bc7d79548325594e76825da6a2f502e05e7979ec29748c0f8dd0198d001d748dc6b65801047482b70d55e3fe9ba024ce58d6499590c5622fb1de4d14211b3b4c2c4b79531922d5e24ecca14e311c2781a5a3700987ab3e2e3dc8de4d1084374832354e635e45e04260b47c97ccbd1c710550 (encrypted)
Stealth Address
dab0debb66e655f78fa038411a608427241f7ed4e75859c7c19607c080e36222
Commitment
8aaf455e3d17cae059dd9cc314df08048fba8018d61836d363da872684e3dc6e
Range Proof
672 bytes (Bulletproof)
Memo
52bcb3083f088e9c52383cdddc696b730e0c7acbbb769692cb306809a02d6fa4ea065122ad779cc08c725763a0727ee08e6fa0b9ea20971c60d9293c61c0222dcf1e5113bf5cb4dc3ba0ca3c9ee70ea031d1288fd241814490f2312be58f84958a6afa01e0b154354060b2e23e7232636d543595adc7e56104280a0245e1cc6e (encrypted)