# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a4925515ae4830f2e4b681ffcbe447a8b028fe408a45bbf6edfcf425ea7e757d
Pseudo Output
9c6b7224fb12d36d45ac86a6b93b3de11907cfbed214880ed38566e484bf7502
Key Image
104a86b89cfc99478fa39caeaca891693d4c2639dc3f87e644fad86b1c0c8021
Pseudo Output
28c59ee7b4ce1609e786a52dc2b2762f0e39efe5293e9482d91831a3ed01f91f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6894b9b3be3cefd556bea5ba9cb96aa4c3314a1d14a8461fec5882a39773b12c
Commitment
b088ce9e04d5a0e6330f6243397f71f9cd186e9a2199e082e1567ef34810c873
Range Proof
672 bytes (Bulletproof)
Memo
f73141d65a76270fb1d96e9865a2f0fc00daee67335b3e7a7ab06154d323bf8d37d21297251c965f95088c5ee8298306a42631b40a4533fbe174d867ed7f1fa56916d8e5a1cb6d47d04c90c95afdea87f1759fb87167559d34b3f058fb85792c2de843185c8292e5b99bda6875791d67b30ae8ab166e0ccc8538255aacf0b865 (encrypted)
Stealth Address
b0ba2a53a85f7a9ee7040c6760894e13ec38a0f62bf050411317341c12b6f056
Commitment
da17305ab98aabf4f5cc3eb6d5b685a4f497e50044e8227973031339e5de9160
Range Proof
672 bytes (Bulletproof)
Memo
df6d53b9aaff258cdb14f285b1833f0f559f82bb2e5f8ca31b131f1c1eced6c357f1c485350d5606a0e72e089b5f8322753e914116e3be365648aa474059533a1190ce8d391c4be584e77dff0b9d67c4835d18776da68800ef27861dfd783e67bc79a2ef5ac446391f84d25b44dafa8d8549b17509fdecea355516ab26df8cd0 (encrypted)