# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
52e39d5331754ee790160fbe5b227744485ecf42287c2d15cc335a4930e81949
Pseudo Output
30990db003a48a7cf74c49c102d0894d3d86def58996353eaaea6b1e78c08c76
Key Image
9c8429ad26b35a56913707a42745c39e27a47cbe19c06d5493fe42d4c6ae6957
Pseudo Output
0aca7e3151b06d5fbb322268b4ab3d8ac1650500c1719df8a72ae17a5a35b857
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5ad52a7317ff2854429d173b497a0bb3e0b6c9c0d9f2b9bc6c8a422593b43133
Commitment
86c56ecf0aa82449baf67795fbac70c3535a458fe5a5a0c27c26e923bbf7c61c
Range Proof
672 bytes (Bulletproof)
Memo
bba714f0742cdaf0f1708f1a8a685af34b25f8200cc7dbdad2e2d341c715d867556640bb407e6dc484badf84dc5afc21e51c3df0459e370b7b4d23a8746809d27a3ddc3f3dc90a512401c26f961532061c94f6b0767c97c9fd297af52aea9ef44a6173ffac8b662574e3c26310292e51be15bd5f54c1a82cabc02d49f4d1fedf (encrypted)
Stealth Address
5c76191b6bd4eb7aab7197727023d0b847b0e92300c86a59f956c044997cac36
Commitment
3a958e98c1a628ccfcc26e0878de6868be065482ff565d1d70c0bfe0743c9147
Range Proof
672 bytes (Bulletproof)
Memo
45a47cff5c8cea3f6e60cc31f6780238bc4a71e88862155ab69743ea5774af9653580c167c0fcbe3a964eea8089762859a810b073e900c36cffbb15ffab607da4c5e45b85cdf39c912a0a56bc4fcd5ce3cf6e09b24586764365e1c117bd8b1f45aecfa4b13436d53f942deaccbbd6645fcff09cf4e48ed3360b004c0b24fdc33 (encrypted)