# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
406349106c82985409e7acc82f99021c2d0c4aeee2f08d31416b92cadcabe25f
Pseudo Output
506f741b8de388e8161dfe073f908733ae5cbb98c440f518c333a8d1d5bd163e
Key Image
50e0f1bfda0b2d7da7c0af04b19e2b9d1d41c45ac1f2a435bae4527cfdc6d742
Pseudo Output
80b130666e1aead91b33580e1e12457c795d25c0b54ed075337847a224814c2a
Key Image
6292a6d52dd21d3dad0872e02ba55e7024c5c42a18b7389e51abc4a8d0143f71
Pseudo Output
56204f90e9a0edfbdc6fc5cf38c764a68ae10e2e0d1e23f9bab5ba075bb36128
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6051cd35b7075232fe7a154cab29ddfcfdeb70a3a4a523f91af1d3f44d1c183d
Commitment
c6ce22b7d381446fad9cd084fa82ef20a0a2b973f3f0a6522257e227dbda0207
Range Proof
672 bytes (Bulletproof)
Memo
6ba897ee0ecc7c54dcc21cf4a45a7874edcc60463e6978eb5c487c0b4e7d24df06c57f29d842c1a9b8c33c825c0ff54eb2e0a5f3f07548b5b498e5b754e23001d5908086a23df7a9e94acd327955815219f646e15a1f9bdab1da085ce452cb502947e1315464cd7436a6b484a514eeb16a5ca6f4b4c2ede5dc3eafbe7750af7e (encrypted)
Stealth Address
fa62a311f54fe3c111f25fb673e9831e11860afe50bcf4a6c47bdd85e50b3e63
Commitment
e6b6d7c4f2d34539e6038f814f26a7b3ab07ae0ea1e8e23b28da164593b44308
Range Proof
672 bytes (Bulletproof)
Memo
83e546782b2b817dd95ed4002bb40afd6ad36bd1dbbbb1931d429c6480f5951b5a7e7fe3e2177d3e0e2965a4caa3f24a7616ca8bc99d0ff3e7ad1ac691d7519b79798e34196cfb0c6d6d4fd4aa9cbc3f557d4812fd820ad740eae72cf1ae556d1be77e4ce9846403579d6579343720fbd536c757b872085606db64612ba82bd4 (encrypted)