# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
649dd339ea74e082d4e6fd43eff8b13051b8fc4b3dee2df0cd3cb1c01d16b923
Pseudo Output
4c577b1cb9662c78b8499b4d714d03d19f233a89bfd4851e47e8702fde497b12
Key Image
40def3d3a8e1393b586a1c7819aa585f082b1c588eaadd913b5aa74f8531937c
Pseudo Output
26a0103427ad53665f6b2da54ef5692d56d34432f4bb4d4f9844407f6705720f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
762583b9a2fb59b98ed3e2cfed6fd6ee631c591c3232a5d727c654c5bdb90e46
Commitment
74e27f1d61701f73df0e573307678b7c995c52de1f2f8796906a6672f299e700
Range Proof
672 bytes (Bulletproof)
Memo
90b8c84130658a3c626303f9bfef6f0bf7dd48ee4971442c142acd33bad044cddfafed29d526e292a56a8b62baa92b788597ea8177f2bfa631b375ceab999427b50caa137b4f652f62c3c401daabde688ac4e844aa7538f35a5f8f739a9ed27092ba5b8b5766459b88bf5cf285a033852f742615bdf161e4f5660b9a1fa49005 (encrypted)
Stealth Address
ea58f73768f4e5c7717804383a0adb8607719a0b3372e3d0729a1a7d4683da01
Commitment
92c3b9ec6efbf56a6db12ebcce137de1c8be291f007ad6c9631be2c431db572d
Range Proof
672 bytes (Bulletproof)
Memo
c6ed8c886956ba11f3aae1a2331d5f4f96bd21de745c371c0df13a1489b525bd8c34c2b12d8d787132ac8443fdbde46242505ea20d67e2a5cb5d0294aba810d93da643322b3e1368e3cdbf2a5310d12b5842ff959a13a3f8ed4d4d5078d110ec8aa6789a208d8bacc2bfe078e7d94e9b4b4e896678dd59e264f927160a716a78 (encrypted)