# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
76f056bf108c820d371cef1396bdd63bdfab4ac1cd31413bbe2cabdd4c061b06
Pseudo Output
bccb56459e3505595dac20c2ffd7704ef8092d7cfed60ff5526950bb4ad0b556
Key Image
909f8c7d64969f439d9b2c5ee94c85dd4e989ae3778b020f83296ec4e231d366
Pseudo Output
da4e8ff19b0b6dd13d6d1b5a5d5592221292c97de9b3b090f91cf81ae0cf2c3f
Key Image
80400521c0bd9ede0346083d4480fae952387c742b562472aa8cb2da1d17b754
Pseudo Output
ae52b1bbddac4a35bce4e389bbddb1750abeaeca1d14809dc52da59d54403a26
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
46a65ab702067c0eb87bec211dc26dada1fa1213338f02af67b27230ee13b67d
Commitment
90ce5e2948840d9d1b7ccdf207bf930aa05914c54bd372a40bf4be8e480d2b1a
Range Proof
672 bytes (Bulletproof)
Memo
cb4670b1a9476d4f421a8efc4b7c1400f9c8b2b93fdc5c9dfea713436ea3ff9a13b2569be849298d8ad2ddae5764bd35a975178d31c0b6b06c69ca7d5252f14daf7333aa5244cc6fbe44897f0427ca9f161ad595c028117210a9cd86d6a3a7c0e2c8eaba9ef62466674a2b4bf86b35ce4ce7d4460ed47c22f3498d9d65639387 (encrypted)
Stealth Address
f6e8801f5b68cf76a9a02d9f5103bac29c4fd47498dc2bff9ef2f46f70ab3477
Commitment
565a462716d951e4eb71b6d7f7a24f34795ccdaa94204188deb31088cf34920b
Range Proof
672 bytes (Bulletproof)
Memo
5b6430a77faeb6e6a50f4e9ca5ab7bbed2da94ef5968cea36e6568996e8a43ade56e8b7650be8c04805dd7409d7fce4f863ce01c418455446bc344ccc5d42c4b67031df5e77b1cf457400691b2d877b6131759ef1a79e5bf47dde6fc956079c289fdaf56196304945a04aec3218a500ab51bcdbcfb47084b0035e3e2cad8debf (encrypted)