# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
88b6b3d9e5d55fd71865a0db2bf1bd3e809c4c9c141c9ba771abfbadd93b713d
Pseudo Output
143488ec38551a6310e079b1e91e55c04972aeafc59c487d4131b7016662456d
Key Image
0c6d6a2ac18e1e83eca724850705e19604512ca318aff14153bdb7277e979c44
Pseudo Output
a40e9de27e6fdc77d970125373af827c327fdfb7c5976571650397a8a6db3c04
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9a21faf98ebd7dcebb8428ae01e89ecb03459c530f882497fc3cf1de5fcb2c1a
Commitment
ae658f11ee5faafd7a071089818f2e4dfcebf977c4cdc739421ed9b77f268d65
Range Proof
672 bytes (Bulletproof)
Memo
21fccf634c7198d82367aaafced422e777abd7daf9c87a51125890bb08bde49e0f9bb62dafc3023687cf88ad9abef3d5c00348c81d2a4022fab2a9e2dd2f508142f0aa93e741ea4c5a0938a6502fd749d47254a507dbd2db94eca4d02bd6f0d855e5fbfc5640f30ab7be3288e3517e07c5dc9badcabc0ff7614265ce6ce6b7e2 (encrypted)
Stealth Address
be7a35bb6611816df0bdda7f882b9f4ca0260bcdb5a3fb3fb92680cac4373034
Commitment
5439e44dd0f828d2205aecc3c61228ccdb5fcda52fc10609232056623e52d205
Range Proof
672 bytes (Bulletproof)
Memo
629539eb1a4aed9b4ea95b619771d3648789ab6e18eb12d59794efeda17fcb30a730b964ab4b5056bfbc66bbbe3fe250b5c229ea74e2e605cd8cf4dd3c8f08fee08f818fb79f692dd59b44c7181972d34c1f594113a686b767a113b0afa3b64a62ee474e63cc066b7a1863bcc4739b0088aca981c76fb28a9c5056752875b55d (encrypted)