# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c271944a9af0c1ced8e219af5c870515a532d8ac2b4a18a6707bdd406376a164
Pseudo Output
40213cb104f19c5f433ce3bdbdb0dd274f03d1c38701e176cde497c9561dac0b
Key Image
5c2963f02bebd48f8c1c0314c0518f3a95a2d955ec29f9bc9dafffed46953671
Pseudo Output
b87a57bde403c5d021e9535631bbf18f5adfbf2ffdea300f33056e60368e6541
Key Image
d2ecef2ca8b9e7f535a2dbf4b167d85b49448d16d250a91fde7a03d4f3b2ee36
Pseudo Output
307f2371bafabb4ede88c7d9f2f772e10fb86fd1cd6955f143c05fd96e52df7e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b2800291c9da3bd9acca5a7679b9f9225a6a408e2afb9dc1eb11f809a916406d
Commitment
460f13bedf385b4d01fcf69ee7ff64ad5999d6d944642862718e841b38a68f3f
Range Proof
672 bytes (Bulletproof)
Memo
1e5f11f92ed50e32b90593c79f18ff5e8d634bc1eddd311393fdbd537c8a62405bc5c73feccf7c0edbe9c19dce79d78703468820dcd0547aaafeff6fdc61fd0c3f91e09e7ee024f798e0d2370035e51659020ffca8c1223cc35dd8b0ca6b8d8df50888dd4ea27aa9e5b5a5b555b44ea26720e73fe57546006c3d09d0aa3dac7a (encrypted)
Stealth Address
4639b5c8d0fd85264badb1c4d4977733abc559a599263f1bc698a81e1af97d0d
Commitment
989799fccdff6bd51f14296e4d4076727068c99dffbbc15aa9af885eb2687206
Range Proof
672 bytes (Bulletproof)
Memo
b1cb8ef2de99767edc416b5dcde32e60b304b6c37b1b80596786e83301ac7088bfb5d163586884b0ad6dd56dfc188ac037f14b005835c3a2765155d5fa9741dfae734393c68c76474e74fb63a6075c0362bd2c1f1496c2ab63b409dc3f3f895c5e6228ce50d493ba0028da556b2a2c46e2b6065bcb8545a0b434ea3623ec3fd3 (encrypted)