# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
661a290e2f5c15fc74753047eef871990aa146de3e04f4ac4f1fb72ad814196b
Pseudo Output
4a156323243e16fd7ffd4fbb8de8511d8bfa88607e7e58f36d5caa294e5c2044
Key Image
10425e71cbcb3413e92d14abae456af480f599ad43f6cbb4130c985503369b54
Pseudo Output
7aee0775f1bb8ce14b48e6d1ca0022e0eb9109bd484ef83672a7f6b8469bbe1c
Key Image
be44a68c8b66ceed05c07a3a79e4ca074e809e97a8e3f42442558ed9b51a7510
Pseudo Output
9a2425cfb64bb0b9968b69ad23c72f60b8a039d2b09ea822c7da538b12d37873
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
928c8e0d589969e6ebb0f2340bd34f6eff682c4697954877138b3ff81a10bb19
Commitment
c81a1318c2c78452a8fdcde40e6f384aa00602314ce24614e5d71cf1fdab7c07
Range Proof
672 bytes (Bulletproof)
Memo
843b79a96012abcf8acf5b69c5a9ba41e15dab270d03fdd124103fa3aff7137652c15b2a928412b2a6ae923ae23a441cedbe27cc436d5a408d85217d149a2f1b70da1fcaba39ebf74405cd9e97e87d01832ea9b65dd8d81986e1351a4117671ea134661366553c601dfa74eb759f764ae49b3f29da9771e69e427e7a477fa643 (encrypted)
Stealth Address
7e60e6548687b39fa64819651e181763686456167be569a1245703a70f1c967d
Commitment
dc44e5847736750f80c42c7aaf790b8b9f83edb777049edd515bebfda5f73944
Range Proof
672 bytes (Bulletproof)
Memo
80164885a7033d0d9fc744156c65a090eb2df6163e18f6f43550f1aefb9f991e579ab8f015ab1994829619178238cbd216fe477bc0772ab02b3c94d65cc74c049030293a372d82098288daf0262db8e977747fa6544c816c64bb826aea20d906de5f21a4b551553433cc38a855cf70faa95b13f3a8dc0f65fd3ae099d0115d4b (encrypted)