# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9466743a5a624703b0bb65150fde5684b6155fb091c127e89832c97a01537e3e
Pseudo Output
a2106f4fbae5f2bc027d5aa38802d31ca34514a585c7e30462ca0d405d28de16
Key Image
8cb1596f3644be2cab9e0157e425632a15b7a8b0276c195014fa1e95c7fb521f
Pseudo Output
460240575ec0c6bf4d6a0b2fa448fe6f91f141dff20ca485879d96c185c2d54d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c6f458a213f90fdb696d0b3f70518dcfe989ceca51f5f0e897cc4e39f8705b15
Commitment
2067a5a46b1483d25394253e74234c2e606624fedb9adc5b6da2e14e17c2ad2e
Range Proof
672 bytes (Bulletproof)
Memo
ff5aeb79fc1565c1b3b28649d8da361e0c934f785f8df6e27bbe2c22901cda925dd2d9c7148ebed3b67b0b9ad4e6e51dfd58c6c9f5a7ce80064ba2283e6a022b6628f7d68e3dfbfcfc067416613373572658e892634d5c11893b490fbb7d2c9b3c8f94753bf005f559541f4fb25c1ae103accc7c10fde2192a20baa4fa00e94a (encrypted)
Stealth Address
3405cf000962efa2d9d83f6c9edd009c601751ce05eed0a8ad6c9d3077e78468
Commitment
66ced694173c906d5128c5484b56fa1b7690e83a905132de19fdde7fd8229f4d
Range Proof
672 bytes (Bulletproof)
Memo
e793e5a206b86e23ead27cab1caa5946075827f6d41006a123a4191805305acf30f7a9a80739b4a65ed3e0a3f9a588e405e77c561ef532e9e483ef6106c2abc2545d77c43fb2cf74d54cc55e4662791e1c24636bd060892db2323fa1c93174dcc8e134c08f6f2504de7d0e7e0588747f70cf4f057e33f3bb501f2ad958ff0d40 (encrypted)