# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4efb494a86977542eae83cadedf7de9e1e2d53e5178638dc9d3b1a8ba7535551
Pseudo Output
9a0de0ad45b0e96ba50bb2d36fe2722abe611fe6aab012d458f0dd6639faa85e
Key Image
e4f8255c0c483aa45a0da2538eee38bbae6447bde801009f618d230250442948
Pseudo Output
42ea72aef952f900bf1985a5d89e4c2d282a92af1bcd07487289bbfc5feefa6b
Key Image
04e166eed5ce0a979bb70ad6b38c7a24c41cfd6208e84102ce7ac3d5f41b172a
Pseudo Output
02bec0d0360ec1773f49e27397559f3e64fb9eb447780275bbf40c684e6dab58
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
76fbab25913f0135217b7b07cd14ff8c3ff406070a9127b0bb27efcfe88bed1b
Commitment
0ad040fc5ad63e674781aace75df7144a14f262d9e443d4c7fe07c7c8c6eae31
Range Proof
672 bytes (Bulletproof)
Memo
3cb08f6f1d8a7de8b96f0715fc94156866fa9221d017e81294fa57df032d49fd114305e7aea9f5a9412d7357576b1c768311f76f3e1178550d1383f2583a54f358c230505e294314493af969643d18d77b065699a26244dcb45b48a71c3f8695722de14daac5bd7161b3a0a590c443cb89ab02698605e4d4c6205ee2b54bb4fc (encrypted)
Stealth Address
6a3cacbb24f578555ce87cefd4f9b3d189a23a4e2e1a4b7226fca352be89aa1a
Commitment
c09ed442f31e57746f84ea862ec83a89a16bbdddfa1869342449618203564917
Range Proof
672 bytes (Bulletproof)
Memo
9520e5499a778fb819aa086f76282f5a9133bc181ca4c04960db67879568d483dbd280649c91f32a40c6f21ba85cd0824e2ddb436e7d58c333e7c0cd9a90c132891e6053370a44b624a2af5f89b82124bc2d55559232eb3ad7132f99faad316ed055bc86510997b78822b4e44fc2305e48b09aaea51c16330dcb4bf38a2540c2 (encrypted)