# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7c99c7ea720d972df756f10637cc367772675cc08be1358600f1248825e6bf04
Pseudo Output
3476daae48559a11861a4c8c0d32bec29b8b71b784a5b178830477f55ecc0970
Key Image
24b11f9692c96b7b8d943e3761aa83665d1a7d2f349766d8d647ddcb949a1657
Pseudo Output
00e3276c32b7f1fcd3a94ab5e91312d0898dd358f04dbe6a03ed1083cd7d7026
Key Image
b0d95268236cfd8fb7f060e38ea9b86304ee743d3226f707211dfc75e0ed9e57
Pseudo Output
6a56d1e3a590d17bd489dfb9de39fa08b5a0f993a2e815de051570e57e095b11
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e01dbe27b5b4b7f07fb730c499dce4802afdaf3e2311ce6c548875c7204db102
Commitment
2e8ed7c6303307d0ee6f8e98b63ec419550f793e66b6ad201881f22e0ca97753
Range Proof
672 bytes (Bulletproof)
Memo
e3eaaa7e44d295b79a1784d17f25c491a8ed956a9f5b8a8174697a78985b05fb5a1696a11dc93ba14e434f18f22ae5e30c3fc2aea358f0553499f6fec07b8b7b6d926683f8e57f6f7a269ac8e7edb3dd48a0bd15ec68aca514601150cfd6a486a802d970741c124e2d703c2fe15797edd7baf92202eced681f86b04c4a3747d9 (encrypted)
Stealth Address
36a88913620877050e89af42353b04d24197de61fd56136255429c2740ffb021
Commitment
a69c6af9122599f43d076c8a22658d7298518a4f36225d6fca46df6419872d2f
Range Proof
672 bytes (Bulletproof)
Memo
5fd3da1aefef30a401c18d8d8c2f6ab661f1b5b87786992742016699bb594b6308bca0df4a1fc2680ca17aa67324bf10fc087b31cb5fc2f2ee5333293ac1af340e407d90406adbb044755f4edb6a4fc66725eba0f406330efc16cfeb833f6f39c044f8037775d66d66c160f3d09f59519ea861b6257087379743fc3cb29ee580 (encrypted)