# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
824d290466f1f34fe10f55ed441461d21a6dc1b31303f0d885546fa76c4fe422
Pseudo Output
f6253f761ec42c425e7c719b7db88d33b344d40021e6b39ff216d97a62ac0059
Key Image
0802c6210e02cf1bbd84953d1270615083480a1823e94e2e0ee622cad2aaa24c
Pseudo Output
445e5dd8f31b3a271bbe86f7840cf3903e7828d21adb82f8dae73d15172ba530
Key Image
2270eca5da52706603325644c5bfcfc63a7ee29f2d2f15cff3b4dfd3facafb15
Pseudo Output
d047fd3510d6b18ba52b56fbc3a7e9ef6a14a8fe4fed1e6266f0ada1636f3901
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d2c65fea59d692ea60b0411ceebcec8e56813f26989be08f3c52cae9d9df5356
Commitment
046abb1664bf475969434f862a7366a37b7dc35c6dcddd77aeadfb7cff871810
Range Proof
672 bytes (Bulletproof)
Memo
3a40304a8381012858223ef2d16ed4afb7a5a39530fe9b205e68a286539c30993d883a148513ec76590985eb900550cbdf07b26e6ab5ed8aed8635d4f3eb6da846f662684c1ce7fcd92d5af6e5f189102c7cafdb05408c308a3afa227eaa3cace9c07ed81a769a0c3bb3930678c37278991749a01c029aae6783f2a71d95a878 (encrypted)
Stealth Address
821376e5ad0d547773633a08b24f5a1a23c6d05624b2c4276a7ed39637d19365
Commitment
9041cd2767c6b65cff76646e9f7e2f17bfbc75a0789f977ffc7d6004bf839a63
Range Proof
672 bytes (Bulletproof)
Memo
6244f6eb3a55d38890f3f8aec84bc895cf3444487be2e9231265edfd599f9b34a673a34d7da9288c643cd23cf62f61647eb37cd24ee3a21560b3aba6cf7542121b86fd574643f2c6f25f785f037a2a25fdd36ade126f3eec1007d8cadb27783ec8cd93953c98e8c7d934f7bfc4d69497a3069665163990176dd1873f4a7f4df1 (encrypted)