# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6cd667b6af11e14b5142dd49e1b4f192c53570d31c96ee016241dad3e5bbc77a
Pseudo Output
846bc6c8f8c07a381b565dbf844570be46064845a77dd62f9d1791c53d72d770
Key Image
c438466e0ecba74512481a61eac427e09ff041ca04d4c2cabf850824d8777454
Pseudo Output
36e3a5012c816d8fd1bc859f151c1b057bd3c62c9fa7728f4c553d825b1ae652
Key Image
e83b5a1537ae6ddc392d738bbf38f0ab4a3bc66372f52945be9074086ca52f30
Pseudo Output
bce1d062fced06a918aa77f017b01dbadc68e82b415cc8d40068c305b25a056e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
20e9d5eedb7ec76954efcd4a778a082a4a36ab88d7433f40798cdc3d08f6b326
Commitment
d6cbd9c42c41147fcce9137cb628b4a31e65f459a33660291b9f30c65c07715b
Range Proof
672 bytes (Bulletproof)
Memo
930b004fe732b2f5a3171195d6735ab83f21d086d379e1b7d380b7fecdc8dd44e3523871a9385a6de2b52008c10968f0e5de05e7144fe0f845515fca22823b9c2551b11c13d3480c007c95afabdd116b5df9d824500ceb587b82a8fc87719cfb52dbd662ad72eaaae9e48a7e1c8e3e205e2130502880474e17e08b9121e5bfd8 (encrypted)
Stealth Address
eeb4632f5fe605a9e74028fdd573863ec38b7f1d2fbe35b67708cac06eeb8828
Commitment
5c1d2a59c74c1075aa07db2a063dc84d2959e4614981197956d780735694e87f
Range Proof
672 bytes (Bulletproof)
Memo
56b3bf44c6f5c128174c0026fe9aadb5820d97289ba1c86fb63aae3213dca960766ab86ed3361d0974934b74a6c62e90c1c23d3d4908d9b604bb889c798b30ab2a61a6d7853b478ec58633f95ce676a04706cb6f26a032932bc4e04b59af218bc87d41b664dd9b68cf8dfd833596c7e45bec93e3906c0a6a4f8b218a4b178268 (encrypted)