# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f634b874fda0412f64f9585ba0007c1a02e01594cec0a19bd72ed5fd40003631
Pseudo Output
2aa190685e4b27997153b3ac11e4e3d5d73e120afc5e33d7b8c24f0e40509b0c
Key Image
86652aebec0aa004b087e67c4983cadcd6fe07c4750498ad3c1719b6fe960e32
Pseudo Output
34a7010380383b09ce2a00d0483689ec62ab73690d7f9890ce21d76ec3f89178
Key Image
220e304e73a24f02c3ba2c4d756d3ce1cdfe3b73e94e61e6ea0de7f473910917
Pseudo Output
044b6adaa55e0f73c3f65fca612de714bc8bafc8fcd4d108333188d6a5cd546d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5c6994f2da28839b0910cc8e03a484c48777ed42772b7ad290d8bdfe7b0fee6b
Commitment
fc67a5c4276625adcc10f28c4252ebda51adbfd4b5b853ab26ce4f05408a6542
Range Proof
672 bytes (Bulletproof)
Memo
7316786b14727b2840399a2ed633a6e7cd01fc4686a0cffae2dceff7127d533e122a7664773e9d370388cc5e1d65e5e421966c3d3f416178706daa02dd043dbe7776f43b0b1aa22f8a8b01457d46693077e3de2d3dc36140dd7a9d2d4ae8eb2bcffc11d7c4be603ddbfa78179d10c7e985fa482ae0afc4cc36ec505cc635a6b5 (encrypted)
Stealth Address
7ae19d4832f204c8b7ce3989f0dda7865ea05d78a9ed38831e1467740d0f532f
Commitment
48520a19dabc69478c9ff8d3d0f1a4ae757114a653377c4d89c1b97a9d64912b
Range Proof
672 bytes (Bulletproof)
Memo
26925dfe0d8a247b27e51abb8548ba17ef678a993017f81b75f32d486e9f2161576e4f36fc356b2799098443735acf06a52b5f0fdc50c886e61867d209e6312a0219f53834fde1feddcd8329104eec1eb7d06d385c776364fda6b394c0672717be2ca2389bcdd7d1e7b8abe983387cec478d19e3050ed0f3856fcc7f028ebda1 (encrypted)