# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
60dcbe24e59f0ff592f2dc35f4d1193d11aa0277d1bb727f862df0912e4ccc21
Pseudo Output
b23e254f5e93c2fb3f4f7d2b9c6fc8754f600313f667bde7e91d2deb34f9d956
Key Image
20586fc59667ed255421970b566f5882c14f037c61c62e04ef6150eb88d38550
Pseudo Output
e6da7653d998d74ec8a623aa1e8821130cd827eb1f4c1554a0cef117ca140e35
Key Image
be91967fb249c26e4f31daebbcfff483d43cfaa2363a6f749f3c18342d1f2c7f
Pseudo Output
9855eb0a629d8dd680faf593c0911ac2b58d884e02e342b0c3b90eefdf866846
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1e3846c74bf988b78918774b1d785465ce2d4b140bcd571d658ea0568c43de40
Commitment
6ee85405d906485ce23e055ff84e70092d0f64d50e7520683ba2c351d7393f7d
Range Proof
672 bytes (Bulletproof)
Memo
e2ff41acb1151c187f46b68234f29a3ff9dff8df6d8c2979a8610ee44b678fbef5190ec54de5db1382b9064ae16b8d4c53ca5fb4b7241ba0dc447f4be45d6d6b832c858d722798486c4a60fc4ed7dafcc473928b29beb6fe18fa0f53d3838a7761738c4c7222c3cf24c6cd87420670e3fd8a8ecd70d79e84f5beb41c75a25917 (encrypted)
Stealth Address
fac73af987576ff3cbb6989ebfc8cc07be361ef90aec3acab2326aa854c4400e
Commitment
3aa83fee36807c1b0e3bf0e443ce2bf3bbc03dad5f6068683021649c8767670d
Range Proof
672 bytes (Bulletproof)
Memo
e8c328102a0a28153475e5ea12475c156289d8c6f7a18ece03f120c7104a75d95e45c3b427031bd5e5a8a793259e2df705acebf23f1374ff0518c8bdfd06d76af2bfafb207c867044881b82b2026b2af98ec7b0f0bcc557e771105b94242e6f8b3044898acd5fe18512c9d8b7ec1017ee9ff61ff48d08405fd138cd32d525273 (encrypted)