# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
065c7bd0d31d2c850ff36eb19d5b4d0935d74cacf87c3d744b17ff48791c2a4c
Pseudo Output
726deaae9939bbdb3bb8a0242bcea8c047ecf44c48a225b493a7988f505c654a
Key Image
20b96ebc4bf6b4cf99391a955014be4536045a28d10d7d3954ce08e956a1df0f
Pseudo Output
f6d6a0d94371c0f21cf10812b3fbf25d7bb9a0130547c3298b5a42373210106e
Key Image
da2087e399acebc64e4be642843f0387db36fc540355d376459d5d58d9233c11
Pseudo Output
fca7caa64bbcd3113d196dcce0124e0f2cd645fc142c8ddfef45cc8cb8dea501
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
26c9771ddd814daddd791b13ff7884da27bdc9b528018aeeb0afcd9ff7431313
Commitment
6ca2c4f7fb03f8ba908f2c7741cef6062b27d76f2ccc60bedcb3d3803f46ea6b
Range Proof
672 bytes (Bulletproof)
Memo
3c4bd5b5d02e44a45ef60ca20b955616f06268fd685c09be536ed152dcb1c9d3397295e72ea79a9b61c0ec3d72dcf7dd43b906d13376ca6084f1ccfd2dc2b192f09e82e21a12268bd70ff34f0b96ab1bc4cd7451f47ac6cc3982b3a8abfa1c0f3518f31208733d73e54714171301ea9e0b2584b76977d084ea92ab289f7eb54e (encrypted)
Stealth Address
b68c8fd14ba7442c39c09b3796759d23a1f60393cf95258269bd9b5f51605d16
Commitment
00f6d65490f8166d5a77d163f696d0f215ff651f9d7eb0b1f7ddf79ee9cde01c
Range Proof
672 bytes (Bulletproof)
Memo
2ed5b562b0d5bd14802a631d80fbfb5aa8872f8cd453b9e5fd148016f449937e921b9fb611a03ae2f425922d3740ce163bde8e0828c3546ec268ae95a5c97283d2cddbaed92b1c2f5725d1b1c091ba1f2d4a0e996d1a9703a59d7e90bce821ca1c13e75cc6a7f87d97090df9cc439277ba717e4742e65f078f1e05ea85ec9291 (encrypted)